{"version":"1.0","provider_name":"TechTonic Times","provider_url":"https:\/\/www.abrahamsconsulting.com\/blog","title":"Protect SMB Remote Users with Fortinet Endpoint Protection - TechTonic Times","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"lhwgkwU6Kf\"><a href=\"https:\/\/www.abrahamsconsulting.com\/blog\/protect-smb-remote-users-with-fortinet-endpoint-protection\/\">Protect SMB Remote Users with Fortinet Endpoint Protection<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.abrahamsconsulting.com\/blog\/protect-smb-remote-users-with-fortinet-endpoint-protection\/embed\/#?secret=lhwgkwU6Kf\" width=\"600\" height=\"338\" title=\"&#8220;Protect SMB Remote Users with Fortinet Endpoint Protection&#8221; &#8212; TechTonic Times\" data-secret=\"lhwgkwU6Kf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.abrahamsconsulting.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2025\/11\/sb_fortinet_endpoint_and_remote_user_protection_thumb.jpg","thumbnail_width":600,"thumbnail_height":700,"description":"Employees working from home or public Wi-Fi often connect through unsecured devices, creating major risks for your SMB. \u26a0\ufe0f  @Fortinet endpoint protection combines zero-trust network access, automated hygiene scanning, web filtering, and real-time breach defense. It ensures users stay protected everywhere they work while simplifying IT management through the Fortinet Security Fabric. Download the solution brief, \"Protect SMB Remote Users with Fortinet Endpoint Protection,\" to understand how to safeguard your hybrid workforce and reduce business risks."}