security q & a


This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon. The User Layer: Part 2 Last time we talked about user education, as well as a range of FortiOS security features that you can use to protect... [Read More]
by RSS Victoria Martin  |  Aug 24, 2015  |  Filed in: Security Q & A
We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come... [Read More]
by RSS Victoria Martin  |  Apr 18, 2015  |  Filed in: Security Q & A
Next up in the Layered Security series is the Device layer. If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all articles that have been written up to this point. The Device Layer While wired networks certainly have their own challenges (many of the precautions here are applicable to wired devices), it is wireless that really changed this layer’s landscape. The biggest change that came with wireless... [Read More]
by RSS Victoria Martin  |  Jan 28, 2015  |  Filed in: Security Q & A
In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because... [Read More]
by RSS Victoria Martin  |  Nov 22, 2014  |  Filed in: Security Q & A
It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important to know how to make a firewall policy work, and to make it work well. Improve Your Design Just because a firewall policy works doesn't mean that it's design is perfect. Since firewalls play such a key role in keeping your network secure, it's important to... [Read More]
by RSS Victoria Martin  |  Jul 11, 2014  |  Filed in: Security Q & A
Now that we've had a look at layered security, it's time to talk about each layer individually to figure out the steps you should take to secure your network. First and foremost is the DNS layer, the first "wall" of security that protects your network from attacks. DNS 101 Domain Name System (DNS) is used like a phonebook to help your computer find websites by translating a domain name to a website's IP address. For example, the domain name www.fortinet.com is translated to the IP address 66.171.121.34, which lets your computer successfully... [Read More]
by RSS Victoria Martin  |  Mar 03, 2014  |  Filed in: Security Q & A
Your FortiGate has just arrived. You've taken it out of its box and connected it to your network. All you need to do now is configure it to protect your network, which raises some questions: what features should you use, how should you use them, and most importantly, why? Before we get into the specifics, let's take a quick look at Fortinet's role layered security and how it can protect you. What is Layered Security? Layered security combines multiple security measures to make sure that you don't have all your security eggs in one basket. This... [Read More]
by RSS Victoria Martin  |  Jan 14, 2014  |  Filed in: Security Q & A
A: The simplest answer is to make yourself a difficult target. Best case practices like patch management and using a basic firewall are easy ways to prevent basic snooping. Having the most up to date patches installed can, more often than not, resolve a majority of basic security vulnerabilities. Patch management is as fundamental to your security posture as changing the oil in your car. Being proactive about it is the veritable low hanging fruit when it comes to filling in security cracks. Adding a basic firewall on your network can make... [Read More]
by RSS Michael Perna  |  Sep 25, 2013  |  Filed in: Security Q & A