Fortinet’s FortiGate firewalls: How to Video

Fortinet's FortiGate firewalls

Our very own resident Fortinet expert, John Myers, has recently developed some highly effective solutions for clients using both explicit and transparent proxies on Fortinet’s FortiGate firewalls.

Rather than tell you more about it here, you can watch John explain in his own words how to control your user’s access to the internet and report on usage by watching his YouTube video posted on our channel.

If you’d like any further advice on Fortinet’s FortiGate firewalls, or any other security issues for that matter, then please just get in touch. We’re always happy to give expert assistance whenever and wherever we can.

Donald Ross
The Fortinet FSSO collector and DC agent can be incredibly valuable tools. Throughout this blog, we’re going to give you the key points in configuring and how to install Fortinet FSSO and DC agent here.
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?
Within the past few weeks, there have been several high-profile data breaches that have originated from Ransomware attacks. This blog will explore these recent attacks and offer practical tips on how you protect your organisation from Ransomware threats.

Want to be in the know?

We’ve got decades of experience installing. configuring and optimising advanced security solutions for private & public sector organisations with complex security & compliance needs.