What is your primary use case for Fortinet FortiMail?
Thanks for sharing your thoughts with the community!
We have implemented this solution in our VMware environment to host our own mail domain. So when the mails come in, we use the security profile and all the features of the FortiMail very efficiently - all the blacklists, safe lists, block lists, and other securities that are there to change and contain. We use spamming and content filtering and attachment filtering.
We have the FortiMail appliance, and it is installed on-premises. It provides email filtering for our Exchange 2013 server.
We primarily use the solution for messaging.
The primary use case for this solution is for filtering emails, internally and for external emails. We have part with Office 365 and the other is hosted inside. We have monitoring and certain policies regarding emails, both in sending and receiving them. The deployment Model is on-premises using a virtual machine.
The primary use of the solution is for email protection and protection against spam.
Our primary use case of this solution is to protect data from our customers and from our internal network. We now have a substitute for the Palo Alto Network and nowadays we also use FortiGate.
Our primary use for this solution is as a secure email gateway. I just use the blocking feature and spam detection.
I'm not working on the local FortiMail installation and really concentrate on servicing and deploying FortiMail to clients. The primary uses depending on the client are anti-spam and anti-fishing as well as threat isolation.
We use the on-prem deployment model of this solution. Our primary use case of this solution is our main gateway and main server.
Our primary use case of this solution is for its anti-spam properties. In order to protect our mail server in our data center from spams, we need an anti-spam program.
We are a solution integrator, and we have been selling this product to our customers. We have three years of experience with it. This is primarily used for anti-spam, in front of Microsoft Office 365. This solution is deployed in a public cloud environment.
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?