Fortinet Cloud Computing Management – To Keep Your Business Down to Earth

Fortinet Cloud Computing Management, or simply Cloud Management, is a solution offered by Fortinet’s FortiCloud product, an extension of FortiGate, along with a log retention program. Without requiring the installation of additional software or hardware, this feature provides reports and analysis of the traffic on log retention and configuration in real time.

For a better application and for increased traffic visibility, FortiCloud added a tool that simplifies the subscription management process. Part of a compliance and security program, the log retention, it administrates a separate storage system.

This process can be cumbrous, and that is why Cloud Management represents a step ahead, doing everything automatically, storing the information from the logs in the cloud. System events, traffic, web, security events or applications information can be stored too.

Another useful feature of this system is the real-time alert and monitoring. Allowing the monitoring is a way to improve the user’s experience and certify the network’s critical availability.

For the network’s security and health, reports and analyses are vital, which is why FortiCloud came with a reporting and analysis tool for their program.  For any compliance, custom reports are always available, enabling a shortcut in case that similar requirements are made. It can even send an email with different period PDF reports.

In order to maintain the high-level performance and security standards, the devices within the network are kept under the same configuration.  Doing the same for the operating system firmware, Cloud Management counts on the advantages of the latest features.

Additionally, the system’s security is top-level. Any type of information changes between the clouds and the device is encrypted. This way, the data can be seen or retrieved by the owner only.

For a good start, Fortinet’s FortiCloud provides clients with a free 1GB dashboard widget for licensing after registering the device.

Besides the application and traffic visibility, real-time monitoring, log retention hosting, analysis of the log reports and management of the configuration, Cloud Management also provides: a dashboard for real-time monitoring and a widget for system, a log viewer, filtering the download capability, drill down analysis for network and independent users, reports generating  and device management, including back-up for configuration and firmware, history of the configuration, script manager and profile alert for real-time monitor.

Along with this, Cloud Manager has its benefits:

  1. It comes with a central, simplified management system;
  2. It allows individual or aggregated views of the device;
  3. It allows visibility over the applications and traffic;
  4. It offers log retention hosting, expandable if required;
  5. It provides real-time alerts for monitoring;
  6. It delivers customized reports;
  7. It lets the user analyze the traffic;
  8. It allows thorough configuration management, backup and upgrades;
  9. It does not require specific software or hardware;
  10. It does not need any deployment on premise and at least no operation and maintenance costs.

This is what Cloud Manager offers to its clients together with the pack of benefits that come with using the last hour Fortinet FortiCloud services for networks based on cloud security management.

An Insight on FortiOS 5

FortiOS 5 is an advanced Firewall Security System providing three times “MORE”: security, control and intelligence. Designed to fight the latest threats the firewall has to face, it is an on-device heuristic engine based on the behavior analysis of each network’s client device. The information provided is specific, enabling the identification of systems that are compromised or subject to latent attacks.

The AV cloud-based services that FortiOS provides come with a sandbox for operating systems and with a database for botnet IP search. The AV database signatures are recommended by a superior industry, making the firewall’s latest malware search unbeatable.

Build as a top-class operating system, the 5th generation’s target is to completely secure devices, providing last-minute performance and protection. Its cooperating services are meant to see attacks before they happen and to improve the mitigation and visibility of the latest threats.

The FortiASIC incorporated processors increase the FortiOS 5’s performance, accelerating the hardware’s response for the multi-threat low-latency security. It is known that this firewall’s protection and performance is unmatched.

Furthermore, the Security Firewall reduces the costs with protection and the workloads of the IT staff. While underplaying the challenges of configuration and development and choosing new virtual or physical appliances for FortiGate, the system enforces a unique policy of security in order to match the environment and simplify the entire process.

Some of the specific features of the FortiOS products are:

  • the Analysis of the Client Reputation;
  • the incorporated sandbox;
  • the personalized policies for the security of each device;
  • the inspection of the traffic encrypted with SSL;
  • the prevention of data loss (DLP);
  • the web filtering;
  • the control of the network’s endpoint access (NAC);
  • management from a central device;
  • higher availability;
  • numerous updates;
  • secure access for the guest account,
  • antivirus;
  • antispam;
  • management of the vulnerability;
  • optimization of WAN;
  • security for VoIP and virtual domains.

With over 150 features added, the new FortiOS 5 is the solution all enterprises can adopt in order to be well equipped and to defeat the latest threats, to protect their network against the large amount of potentially harmful applications.

Thanks to its three “MORE” ingredients, the firewall offers higher security and defeats more threats. The feature analyzing the client’s reputation provides specific information on any device that can contribute to the system’s defeat. It also has more control over any BYOD environment and mobile device, having specific security and accessing profiles based on device type, group, usage or location.

Last but not least, the FortiOS 5 is more intelligent, applying automatic policy acceptance based on role for guests or users following the location point, the data or the profile of the application. Enhanced analysis and reports provide another intelligent feature, allowing the network’s administrator to closely inspect every user, device, application or threat.

Announced along with three other features, FortiAnalyzer 5.0, FortiClient 5.0 and FortiManager 5.0, FortiOS 5 addresses enterprises searching for a high management solution for their network infrastructure and devices, avoiding threats, breaches, dead-points, all without considerable efforts and without a large amount of time spent.

For more information on how you can get Fortinet Products or Services, please call Dolomite Technology toll-free at 1-855-365-6648.

5 Simple Ways To Avoid Getting An Avalanche Of Spam

In the past Dolomite, and many other companies, have discussed ways of getting off SPAM list as well as other ways to get your Inbox back. These discussions are usually core concepts in our Email Solutions discussions. Many years ago we released a white-paper that talked about some of the core tips to implement as part of any email solutions plan. With the constant changes in technology, we felt now is a good time to update that document and re-release it to the public. As you read through this, please keep in mind that if you have any questions, we at Dolomite are here to help.

In the mean time, here you go …


As you probably already know from firsthand experience, once you’re on a spammer’s list, it’s next to impossible to get off. And changing your e-mail address can be a major inconvenience especially if you rely on it to stay in touch with important business and personal contacts.

To reduce the chances of your e-mail address getting spammed, here are 5 simple preventative measures you can take that will go a long way in keeping not-so-delicious spam out of your in-box.

1. Use a disposable e-mail address or email alias.

If you buy products online or occasionally subscribe to websites that interest you, chances are you’re going to get spammed.

To avoid your main e-mail address from ending up on their broadcast list, set up a free Internet e-mail address or alias with Gmail or other email providers and use it when buying or opting in to online newsletters. You can also use a throwaway e-mail address when making purchases or subscribing to newsletters (see #4 below).

If you do not like having to check multiple email address then have it forward all email through to your main email.

That’s all there is too it. Every once in a while, especially if you see yourself beginning to see a lot of SPAM, simply delete your email alias and begin again. All that SPAM with the disposable email will now have no where to go, freeing up your email Inbox.

2. Pay attention to check boxes that automatically opt you in.

Whenever you subscribe to a website or make a purchase online, be very watchful of small, pre-checked boxes that say, “Yes! I want to receive offers from third party companies.”

If you do not un-check the box to opt-out, your e-mail address can (and will) be sold to every online advertiser.  To avoid this from happening, simply take a closer look at every online form you fill out.

3. Don’t use your main e-mail address on your website, web forums, or newsgroups.

Spammers have special programs that can glean e-mail addresses from websites without your permission. If you are posting to a web forum or newsgroup, use your disposable e-mail address instead of your main e-mail address.

If you want to post an e-mail address on your home page, use “info@” and have all replies forwarded to a folder in your in-box that won’t interfere with your main address. If you have access to the HTML editor for your webpage, you can replace the “@” symbol with the HTML characters “@”. This will not stop all website scrapers and programs from harvesting your email address, but it will cause errors for quite a few helping to reduce potential SPAM a bit more.

4. Create throwaway e-mail accounts.

If you own a web domain, all mail going to an address at your domain is probably set up to come directly to you by default.  For example, an e-mail addressed to anything@yourdomain.com will be delivered to your in-box.

This is a great way to fight spam without missing out on important e-mails you want to get. The next time you sign up for a newsletter, use the title of the website in your e-mail address. For example, if the website is titled “technologysecrets.com”, enter “technologysecrets@yourdomain.com” as your e-mail address. If you get spammed, look at what address the spam was sent to.

If technologysecrets@yourdomain.com shows up as the original recipient, you know the source since that e-mail address was unique to that web site. Now you can easily stop the spam by making any e-mail sent to that address bounce back to the sender.

5. Don’t open, reply to or try to opt-out of obvious spam e-mails.

Opening, replying to, or even clicking a bogus opt-out link in an obvious spam e-mail signals that your e-mail address is active, and more spam will follow.

The only time it is safe to click on the opt-out link or reply to the e-mail is when the message was sent from a company you know or do business with (for example, a company that you purchase from or a newsletter you subscribed to).


Finally! A Way To Stop Spam, Spyware, And Pop-Ups From Taking Over Your Computer

If you are absolutely fed up with the number of spam e-mails you get every day, the annoying pop-ups being shoved in your face when you surf the net, and advertisers installing spyware on your computer to monitor your every move and serve up unwanted ads, then please read on.

We’re Waging War Against Spam, Spyware, and Pop-Ups!

Dolomite Technology has been working with customers for years to help stop SPAM from getting to their mailbox. For years, this has been the largest complaint we heard from people who later become our customers. In addition, we scan their email to help prevent viruses from getting through the mail filters as well, the second biggest concern for many people .

Needless to say, our customer no longer worry about SPAM, Viruses, Malware, or Spyware. Why? Because Dolomite Technology has a program that not only guarantees 100% email process, but will filter SPAM, Viruses, Malware, Spyware and other harmful items from your email.

If you are suffering from an email problem, or just want some help managing your email, check out our Email Solutions page.