The History of Fortinet
Terminologies
Cyber Security Best Practices
Systems and Tools
100

These two brothers co-founded Fortinet.

Who are Ken Xie and Michael Xie?

100

This cyber attack involves tricking individuals into revealing personal information by pretending to be a trustworthy entity.

What is phishing?

100

This type of password typically includes a mix of letters, numbers, and special characters to enhance security.

What is a strong password?

100

This system is utilized on a daily basis to quote, pull asset reports, look up account details and more. 

What is RTS

200

This is the year Fortinet was founded.

What is the year 2000?

200

This type of malicious software includes viruses, worms, and Trojan horses.

What is malware?

200

This security measure requires two forms of identification before granting access to an account.

What is two-factor authentication?

200

This organized spreadsheet contains information about prices of various products and services. It is updated at least once a quarter and as a renewal team we heavily rely on it.

What is a Price List?

300

This is the year Fortinet shipped their first product, which was the (blank) 

What is the year 2002 and FortiGate?

300

This type of malware encrypts a victim's files and demands payment for the decryption key.

What is ransomware?

300

These fraudulent attempts aim to steal sensitive information by masquerading as a trustworthy entity in electronic communications.

What is phishing scams?

300

This organized spreadsheet contains a list of different Models which may or may not be EOO. It is updated at least once a quarter. As a renewal team we heavily rely on it, specifically when someone is interested in upgrading their current Hardware.

What is the TradeUp Matrix

400

This is the year Fortinet went public on the NASDAQ Global Market. 

What is the year 2009?

400

This security system monitors and controls incoming and outgoing network traffic based on predetermined security rules.

What is a firewall?

400

This service creates a secure, encrypted connection over a less secure network, such as the internet.

What is a VPN (Virtual Private Network)?

400

You can locate a wide variety of information through this tool. We come here to find contract information, license numbers, CS tickets and more.

What is FortiCare

500

This phrase inspired the name Fortinet

What is "Fortified Networks"?

500

This tactic involves manipulating people into divulging confidential information or performing actions that compromise security.

What is social engineering?

500

These types of software programs are designed to detect, prevent, and remove malicious software from computers.

What is antivirus and anti-malware programs?

500

This tool is used to monitor and manage the status of a purchase order. You can find the following information within this tool:

PO Number 

Order Date

Delivery Date

Quantity 

and more.

What is PO Tracker?