Fortinet Description

Fortinet stands out as a prominent global entity in the realm of cybersecurity, recognized for its all-encompassing and cohesive strategy aimed at protecting digital infrastructures, devices, and applications. Established in the year 2000, the company offers an extensive array of products and services, which encompass firewalls, endpoint security, intrusion prevention systems, and secure access solutions. Central to its offerings is the Fortinet Security Fabric, a holistic platform that effectively melds various security tools to provide enhanced visibility, automation, and real-time intelligence regarding threats across the entire network. With a reputation for reliability among businesses, governmental bodies, and service providers across the globe, Fortinet places a strong emphasis on innovation, scalability, and performance, thereby ensuring a resilient defense against the ever-evolving landscape of cyber threats. Moreover, Fortinet’s commitment to facilitating digital transformation and maintaining business continuity further underscores its role as a pivotal player in the cybersecurity industry.

Integrations

Reviews - 1 Verified Review

Total
ease
features
design
support

Company Details

Company:
Fortinet
Year Founded:
2000
Headquarters:
United States
Website:
www.fortinet.com

Media

Fortinet Screenshot 1
Recommended Products
Comprehensive Cybersecurity to Safeguard Your Organization | SOCRadar Icon
Comprehensive Cybersecurity to Safeguard Your Organization | SOCRadar

See what hackers already know about your organization – and stop them from getting in.

Protect your organization from cyber threats with SOCRadar’s cutting-edge threat intelligence. Gain 360° visibility into your digital assets, monitor the dark web, and stay ahead of hackers with real-time insights. Start for free and transform your cybersecurity today.
Free Trial

Product Details

Platforms
Web-Based
Windows
Mac
Linux
On-Premises
Types of Training
Training Docs
Live Training (Online)
Webinars
In Person
Training Videos
Customer Support
Business Hours
Online Support

Fortinet Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Identity Management Software

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Load Balancing Software

Authentication
Automatic Configuration
Content Caching
Content Routing
Data Compression
Health Monitoring
Predefined Protocols
Redundancy Checking
Reverse Proxy
SSL Offload
Schedulers

Network Security Software

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Cloud Management Software

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

SIEM Software

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Data Loss Prevention Software

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Privileged Access Management Software

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Firewall Software

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Secure Email Gateway Software

Anti-Malware
Archiving
Customizable
Data Loss Prevention
End-to-End Encryption
Real-time Dashboards
Reporting / Analytics
Sandbox
Threat Protection

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Application Delivery Controllers (ADC)

CGNAT
Content Redirection
IP Traffic Optimization
Load Balancing
Proxy / Reverse Proxy
SSL Offload
Server Health Monitoring
Traffic Chaining / Steering
Web Application Firewall (WAF)

SD-WAN Solution

Application Delivery Control
Centralized Orchestration
Dynamic Path Selection
Multi-Cloud Management
Policy-based Management
VPN
WAN Optimization
Zero-Touch Provisioning

Incident Response Software

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Fortinet Lists

Fortinet User Reviews

Write a Review
  • Name: Anonymous (Verified)
    Job Title: CIO
    Length of product use: 2+ Years
    Used How Often?: Daily
    Role: User, Administrator
    Organization Size: 26 - 99
    Features
    Design
    Ease
    Pricing
    Support
    Likelihood to Recommend to Others
    1 2 3 4 5 6 7 8 9 10

    Amazing

    Date: Dec 06 2024

    Summary: Fortinet delivers a top-tier cybersecurity solution that stands out for its reliability and effectiveness. Its comprehensive suite of products, including firewalls, endpoint protection, and secure networking tools, provides strong protection against modern threats. The platform’s ability to scale makes it suitable for businesses of all sizes, offering excellent value and peace of mind.

    Positive: Fortinet’s security features are highly advanced, particularly its firewalls and threat intelligence capabilities, which effectively detect and mitigate risks in real-time. The user interface is intuitive, and the solution integrates seamlessly into existing IT environments, reducing the complexity of implementation. Additionally, the company’s commitment to constant updates ensures robust protection against emerging threats.

    Negative: While Fortinet is a powerful solution, some features can be complex for beginners to fully leverage without proper training. Additionally, premium support services can be pricey, although the quality of assistance is high. These minor drawbacks do not overshadow the platform’s overall excellence.

    Read More...
  • Previous
  • You're on page 1
  • Next