G2 Crowd Acquires Siftery to Create a New Way to Buy and Manage Software Spend šŸš€

FortiGate

4.3
(13)

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Work for FortiGate?

Learning about FortiGate?

We can help you find the solution that fits you best.

Find the Right Product

FortiGate Features

Network

Overlay and Underlay

Take away need to manage separate overlay and underlay networks.

Not enough data available

Connectivity

Enable network connectivity to private and public data sources.

Not enough data available

Availability

Provide high availability and load balancing.

Not enough data available

Security - Unified Threat Management

Antivirus

Tools to protect a system from viruses by scanning and quarantining any threats.

Not enough data available

Whitelists

The ability to green light a specific URL or system to bypass the scanning process.

Not enough data available

Antispam Filtering

Tools to prevent spam emails and other spam from entering the network.

Not enough data available

Content Filtering

Tools to filter specific content based on the MME type or file extension.

Not enough data available

Web Filtering

Tools to block certain websites from being viewed by those in a network.

Not enough data available

Firewall

Tools to block off a network or system from outside networks or systems to protect the data within.

Not enough data available

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

82%
(Based on 5 reviews)

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

Not enough data available

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

80%
(Based on 6 reviews)

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

Not enough data available

Application

Integration

Allow for seamless integration of apps.

Not enough data available

Performance

Improve application performance.

Not enough data available

Health

Monitor the health of your applications.

Not enough data available

Self-Heal

Self-heal application issues.

Not enough data available

Simplify

Simplify application deployment.

Not enough data available

Expenses

Reduce operating expenses.

Not enough data available

Administration

Reports & Analytics

The ability to digest a large amount of data into visual representations and analytics.

Not enough data available

Dashboard

The ability to view a large amount of data in one place using customizable widgets.

Not enough data available

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

76%
(Based on 7 reviews)

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

85%
(Based on 7 reviews)

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

85%
(Based on 6 reviews)

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

78%
(Based on 6 reviews)

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data available

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data available