The FortiGate/FortiWiFi-60, 70, 80 and 90 series are compact, all-in-one Network Security Appliances that deliver Fortinet’s Connected UTM solution. The FortiGate/FortiWiFi/FortiRugged-60-90 series appliances offer the network security, connectivity and performance you need. With Connected UTM you get a single device that integrates comprehensive enterprise-grade protection with a broad range of Wired and Wireless connectivity options. It enables you to deploy a high-performance, highly secure remote infrastructure with one appliance that’s easy to set up andcentrally manage.

Data Access AV Defender, powered by Bit Defender, uses our powerful network monitoring software to manage Anti-Virus protection for your entire site. Data Access is able to remotely control signature updates, monitor scan results and remotely scan any system on your network.

Ads, fraud schemes, porn, viruses, phishing attempts… if it’s junk e-mail, Data Access’ e-mail filtering software solutions will stop spam before it reaches your mail server. The Data Access AntiSpam Solution is powered by Roaring Penguin and provides,

  • Customizable and scalable spam and virus protection
  • Automatic updates on spam software
  • Inbound and outbound mail scanning
  • Per-user Bayesian analysis, whitelists, blacklists, rules and quarantines
  • Software or Appliance spam blocking options
  • Simple Administration

Providing extensive end-user controls, Data Access users can choose from a customizable list of spam filtering options such as high, medium, or low spam scanning, or choose the ‘Expert Interface’ for more granular controls.

Temporary Storage

Data Access Anti-Spam will store messages locally for a period of 5 days by default in the event that the destination server is unavailable. This can be configured to a different length if needed.


Data Access Anti-Spam provides the ability for end users to manage their own settings and options. They can manage how mail is detected as spam, if it is to be automatically rejected (discarded), held in a trap or tagged and passed through. Users also can manage their own rules for whitelisting, blacklisting, content filtering, DNSBLs, Bayesian settings and so on. Administrators can set permissions to restrict the settings users have access to.

In specific cases other users can be granted access to manage another user’s settings. This is done by explicitly indicating which accounts a user has access to manage. This is done by the administrator of the system.