FortiGate

4.4
(18)

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Work for FortiGate?

Learning about FortiGate?

We can help you find the solution that fits you best.

FortiGate Features

Network

Overlay and Underlay

Take away need to manage separate overlay and underlay networks.

Not enough data available

Connectivity

Enable network connectivity to private and public data sources.

Not enough data available

Availability

Provide high availability and load balancing.

Not enough data available

Security - Unified Threat Management

Antivirus

Tools to protect a system from viruses by scanning and quarantining any threats.

Not enough data available

Whitelists

The ability to green light a specific URL or system to bypass the scanning process.

Not enough data available

Antispam Filtering

Tools to prevent spam emails and other spam from entering the network.

Not enough data available

Content Filtering

Tools to filter specific content based on the MME type or file extension.

Not enough data available

Web Filtering

Tools to block certain websites from being viewed by those in a network.

Not enough data available

Firewall

Tools to block off a network or system from outside networks or systems to protect the data within.

Not enough data available

Prevention

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access.

Not enough data available

Firewall

Protects servers, data center infrastructure and information from a variety of attacks and malware threats.

Not enough data available

Encryption

Provide some level of encryption of information, protecting sensitive data while it exists within the data center.

Not enough data available

Security hardening

Facilitates system and network security by identifying and remediating vulnerabilities

Not enough data available

Cloud Data Protection

Provides high quality and wide scope of in-cloud and offline data security capabilities.

Not enough data available

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

83%
(Based on 6 reviews)

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

90%
(Based on 5 reviews)

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

81%
(Based on 7 reviews)

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

83%
(Based on 5 reviews)

Application

Integration

Allow for seamless integration of apps.

Not enough data available

Performance

Improve application performance.

Not enough data available

Health

Monitor the health of your applications.

Not enough data available

Self-Heal

Self-heal application issues.

Not enough data available

Simplify

Simplify application deployment.

Not enough data available

Expenses

Reduce operating expenses.

Not enough data available

Administration

Reports & Analytics

The ability to digest a large amount of data into visual representations and analytics.

Not enough data available

Dashboard

The ability to view a large amount of data in one place using customizable widgets.

Not enough data available

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data available

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data available

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data available

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

77%
(Based on 8 reviews)

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

85%
(Based on 8 reviews)

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

86%
(Based on 7 reviews)

Administration

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data available

Administration Console -

Provides a centralized console for administation tasks and unified control.

Not enough data available

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data available

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

79%
(Based on 7 reviews)

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

90%
(Based on 5 reviews)

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

90%
(Based on 5 reviews)