Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Fortinet stands out as a prominent global entity in the realm of cybersecurity, recognized for its all-encompassing and cohesive strategy aimed at protecting digital infrastructures, devices, and applications. Established in the year 2000, the company offers an extensive array of products and services, which encompass firewalls, endpoint security, intrusion prevention systems, and secure access solutions. Central to its offerings is the Fortinet Security Fabric, a holistic platform that effectively melds various security tools to provide enhanced visibility, automation, and real-time intelligence regarding threats across the entire network. With a reputation for reliability among businesses, governmental bodies, and service providers across the globe, Fortinet places a strong emphasis on innovation, scalability, and performance, thereby ensuring a resilient defense against the ever-evolving landscape of cyber threats. Moreover, Fortinet’s commitment to facilitating digital transformation and maintaining business continuity further underscores its role as a pivotal player in the cybersecurity industry.

Description

LogMeIn Pro is a trusted remote access solution designed to provide seamless and secure connectivity to PCs and Macs from any device, including desktops and mobile phones. It enables individuals and small businesses to access their work computers remotely, improving flexibility and productivity by turning any location into a functional office. Key features include unlimited user access, quick file transfers, remote printing capabilities, and support for multi-monitor setups to mirror multiple screens remotely. The platform also integrates Bitdefender antivirus for comprehensive protection against malware and online threats. Various pricing plans cater to different needs, allowing access to 2, 5, or 10 computers with annual billing. Users benefit from a secure connection, easy setup, and features designed to simplify remote work. Testimonials highlight how LogMeIn Pro keeps business owners and staff connected and productive from afar. Overall, it reduces downtime and eliminates the need for daily commutes, enabling better work-life balance.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend Threat Control
AWS Marketplace
Abstract Security
Amazon Web Services (AWS)
DataBahn
Dragos Platform
FortiADC
FortiAIOps
FortiAnalyzer
FortiCASB
Fortinet FortiWeb Web Application Firewall
Fortinet Security Fabric
Google Cloud Platform
Lacework
Microsoft Azure
Nautobot
OpenVoice
Oracle Cloud Infrastructure
Teamstack
Tenzir

Integrations

A10 Defend Threat Control
AWS Marketplace
Abstract Security
Amazon Web Services (AWS)
DataBahn
Dragos Platform
FortiADC
FortiAIOps
FortiAnalyzer
FortiCASB
Fortinet FortiWeb Web Application Firewall
Fortinet Security Fabric
Google Cloud Platform
Lacework
Microsoft Azure
Nautobot
OpenVoice
Oracle Cloud Infrastructure
Teamstack
Tenzir

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$30 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Fortinet

Founded

2000

Country

United States

Website

www.fortinet.com

Vendor Details

Company Name

GoTo

Founded

2003

Country

United States

Website

www.logmein.com/products/pro

Product Features

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Load Balancing

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

SD-WAN

Application Delivery Control
Centralized Orchestration
Dynamic Path Selection
Multi-Cloud Management
Policy-based Management
VPN
WAN Optimization
Zero-Touch Provisioning

Secure Email Gateway

Anti-Malware
Archiving
Customizable
Data Loss Prevention
End-to-End Encryption
Real-time Dashboards
Reporting / Analytics
Sandbox
Threat Protection

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

Remote Support

Diagnostic Tools
File Transfer
Live Chat
Real-time Chat
Remote Control
Screen Sharing
Session Recording
Session Transfer
Surveys & Feedback

Alternatives

Alternatives

VersaONE Reviews

VersaONE

Versa Networks
RemoteView Reviews

RemoteView

RSUPPORT Co. Ltd.