Fortinet’s FortiGate firewalls: How to Video

Fortinet's FortiGate firewalls

Our very own resident Fortinet expert, John Myers, has recently developed some highly effective solutions for clients using both explicit and transparent proxies on Fortinet’s FortiGate firewalls.

Rather than tell you more about it here, you can watch John explain in his own words how to control your user’s access to the internet and report on usage by watching his YouTube video posted on our channel.

If you’d like any further advice on Fortinet’s FortiGate firewalls, or any other security issues for that matter, then please just get in touch. We’re always happy to give expert assistance whenever and wherever we can.

Donald Ross
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?
Within the past few weeks, there have been several high-profile data breaches that have originated from Ransomware attacks. This blog will explore these recent attacks and offer practical tips on how you protect your organisation from Ransomware threats.
As technology continues to develop, unfortunately so do vulnerabilities. As a result, the Council of the European Union (EU) has introduced the NIS 2 Directive, an updated framework to enhance cybersecurity resilience in critical sectors such as healthcare and banking. This blog will provide an overview of the NIS 2 Directive, its implications, and the steps you should take to achieve compliance and enhance your business's security posture.