{"id":4524,"date":"2021-03-31T01:02:07","date_gmt":"2021-03-31T06:02:07","guid":{"rendered":"https:\/\/www.filerepairtools.com\/tips\/?p=4524"},"modified":"2021-03-31T01:02:07","modified_gmt":"2021-03-31T06:02:07","slug":"fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network","status":"publish","type":"post","link":"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/","title":{"rendered":"Fortinet Chinese Name &#8220;Fita&#8221; Will Be Officially Changed to &#8220;Anti-Special Network&#8221;"},"content":{"rendered":"\n<p>Fortinet will officially change its Chinese name to \u201canti-special network.\u201d The Fortinet Chinese name had, until now, been \u201cFita,\u201d but the new name will reflect the cybersecurity company\u2019s commitment to tackling complex and advanced security threats in China.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Fortinet_China%E2%80%94Following_the_Global_Footsteps_and_Improving_the_Concepts_of_Traditional_Security\" >Fortinet China\u2014Following the Global Footsteps and Improving the Concepts of Traditional Security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Secure_Remote_Working\" >Secure Remote Working<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Remote_Access_Assistance\" >Remote Access Assistance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Advanced_Firewalls\" >Advanced Firewalls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Free_VPN_Software\" >Free VPN Software<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#Free_Security_Resources\" >Free Security Resources<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#The_Fortinet_Security_Fabric%E2%80%94An_Active_Defense_system\" >The Fortinet Security Fabric\u2014An Active Defense system<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/filerepairtools.com\/tips\/fortinet-chinese-name-fita-will-be-officially-changed-to-anti-special-network\/#The_Anti-Special_Network\" >The Anti-Special Network<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2021\/04\/tech.jpg\"><img decoding=\"async\" src=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2021\/04\/tech.jpg\" alt=\"technology\" class=\"wp-image-4540\"\/><\/a><\/figure>\n\n\n\n<p>The change of name signifies that the Fortinet company in China follows in the global footsteps of cybersecurity that prevents evolving threats. \u201cAnti-special network\u201d now brings customers in China a Security Fabric active defense architecture that provides real-time protection and intelligence to fight even the most challenging cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Fortinet_China%E2%80%94Following_the_Global_Footsteps_and_Improving_the_Concepts_of_Traditional_Security\"><\/span>Fortinet China\u2014Following the Global Footsteps and Improving the Concepts of Traditional Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Fortinet cybersecurity company is continuously evolving to help organizations and users stay secure in an era of increasingly sophisticated cyber threats. A single-point defense is no longer sufficient to defend against the complicated threats that endanger complex modern networks and systems.<\/p>\n\n\n\n<p>Growing trends like the Internet of Things (IoT), cloud computing, and mobile computing have created a new digital blueprint for end users. These trends have blurred the lines of where networks start and end, while the concept of network boundaries no longer applies.<\/p>\n\n\n\n<p>Fortinet is improving traditional security concepts, protecting these new-look networks and helping organizations meet the complex threat situations they now face. It does this through solutions such as:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Secure_Remote_Working\"><\/span>Secure Remote Working<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Fortinet has taken steps to ensure that customers and partners can rely on the cybersecurity company for support and protection.&nbsp;<\/p>\n\n\n\n<p>For example, FortiGate firewalls have remote work solutions built into them and are available at no extra charge. The FortiGate solution is ideal for remote work purposes. It aggregates and terminates four times more concurrent virtual private network (VPN) connections and 14 times better Internet Protocol security (IPsec) performance than other similar solutions.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Remote_Access_Assistance\"><\/span>Remote Access Assistance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The FortiGate platform provides the foundations for the Fortinet software-defined networking in a wide-area network (SD-WAN) solution. This enables organizations to furnish users with remote access to cloud and internal resources without purchasing additional hardware or licenses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Advanced_Firewalls\"><\/span>Advanced Firewalls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Fortinet next-generation firewalls (NGFWs) enable organizations to protect any network edge at scale. NGFWs safeguard organizations from internal and external threats through network filtering and monitoring, packet filtering, Internet Protocol (IP) mapping, IPsec, and secure sockets layer (SSL) VPN support. They also enable more in-depth network insight and visibility, application control, SSL inspection, and intrusion prevention, allowing organizations to identify and block malware and advanced threats across their entire attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Free_VPN_Software\"><\/span>Free VPN Software<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Fortinet FortiClient VPN software is freely available for users to navigate the internet securely, regardless of what Wi-Fi network they connect to. This VPN solution enables users to establish encrypted, highly secure VPN connections on their business and personal computers, and mobile devices. Organizations can also combine this solution with a FortiGate firewall, empowering them to offer IPsec and SSL VPN connectivity for their entire remote workforce.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Free_Security_Resources\"><\/span>Free Security Resources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Fortinet also offers a range of free online training resources and technology that enables remote access. The cybersecurity company\u2019s Information Security Awareness and Training Service is crucial to encouraging employees to work securely at all times and no matter where they work. This is vital as cybercriminals deploy more sophisticated techniques and target remote workers in their attempts to intercept corporate data and networks.\u00a0<\/p>\n\n\n\n<p>The Fortinet training helps employees learn how to recognize the signs of an attack, how attackers target their victims, and the latest cyber threats utilized by attackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Fortinet_Security_Fabric%E2%80%94An_Active_Defense_system\"><\/span>The Fortinet Security Fabric\u2014An Active Defense system<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Fortinet Chinese operation is committed to ensuring that its concepts, products, and solutions keep pace with the rapidly evolving cybersecurity threat landscape. The cybersecurity company\u2019s technology offers updates that protect organizations and users from the latest cyber threat and attack vectors and ensure they are always on top of future trends.<\/p>\n\n\n\n<p>For example, as the threat landscape expands with concepts like co-location and multi-cloud adoption, traditional firewalls cannot help organizations meet their customers\u2019 escalating needs. These firewalls cannot protect at scale, which results in a substandard user experience and weak security levels. The Fortinet NGFWs solve this issue by including future updates, enabling them to evolve in pace with the threat landscape. This ensures that organizations are always protected against the latest attack vectors and keep their networks and users secure against the latest threats.<\/p>\n\n\n\n<p>In the face of advanced threats and cyber techniques, organizations need to improve and evolve their security defenses continuously. A single-point defense is no longer sufficient to meet the complex threats that businesses face. Therefore, Fortinet believes an active defense system is required to help organizations protect their borderless, multi-protocol networks that are flooded with access requests from various types of devices from a wide range of locations.<\/p>\n\n\n\n<p>The Fortinet Security Fabric is an active defense system architecture that provides security-driven networking and intelligent, seamless protection across organizations\u2019 entire attack surfaces. This system includes FortiGate NGFWs, as well as dynamic cloud security and secure access solutions. Security Fabric also encompasses FortiGuard Artificial Intelligence, FortiSandbox, and FortiGuard Labs threat intelligence, which enable the detection and prevention of new and emerging security threats in real-time.&nbsp;<\/p>\n\n\n\n<p>Security Fabric begins with the architecture, all the way to securing the network with FortiSwitch switches, FortiAP wireless access points (WAPs), software-defined networking (SDN) switches, and SD-WAN. It also extends from the mobile access layer and application layer to the cloud using the Fortinet security information and event management (FortiSIEM) solution as the core\u2014alongside FortiGate firewalls, FortiMail security gateway, and FortiWeb web application firewall (WAF).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Anti-Special_Network\"><\/span>The Anti-Special Network<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Fortinet Chinese name change reflects the company\u2019s determination to keep pace with the security threat landscape. Fortinet offers a complete and active cybersecurity defense system that keeps organizations secure from the latest attack vectors and security threats and keeps users safe on any device and location.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2021\/04\/network.jpg\"><img decoding=\"async\" src=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2021\/04\/network.jpg\" alt=\"\" class=\"wp-image-4542\"\/><\/a><\/figure>\n\n\n\n<p>As cyberattacks continue to increase in sophistication and potential devastation, organizations must have the appropriate defenses to protect themselves. The brand-new Fortinet Chinese name &#8220;anti-special network&#8221; offers an active defense and the evolving security defenses required to protect the modern enterprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet will officially change its Chinese name to \u201canti-special network.\u201d The Fortinet Chinese name had, until now, been \u201cFita,\u201d but the new name will reflect the cybersecurity company\u2019s commitment to tackling complex and advanced security threats in China. The change of name signifies that the Fortinet company in China follows in the global footsteps of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-4524","post","type-post","status-publish","format-standard","hentry","category-how-to"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts\/4524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/comments?post=4524"}],"version-history":[{"count":0,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts\/4524\/revisions"}],"wp:attachment":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/media?parent=4524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/categories?post=4524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/tags?post=4524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}