You're currently on:
Traditional UTM security services including Antispam, Antivirus, Content Disarm & Reconstruction, FortiSandbox Cloud, NGFW Application Control and IPS, Virus Outbreak Protection, Web Filtering, and core FortiCare security services with 8x5 support.
Intrusion Prevention (IPS)
FortiGuards Automated updates provide latest defenses against network-based threats. You get the latest defenses against stealthy network-level threat, a comprehensive IPS Library with thousands of signatures, flexible policies that enable full control of attack detection methods to suit complex security applications, resistance to evasion techniques proved by NSS Labs and the IPS signature lookup service.
Content Disarm & Reconstruction (CDR)
strips active content from files in real-time, creating a sanitized file and active content is treated as suspect and removed. CDR processes incoming files, deconstructs them, and removes any possibility of malicious content in your files that do not match firewall policies, fortifying your zeroday protection strategy.
Virus Outbreak Protection Service (VOS)
closes the gap between antivirus updates with FortiCloud Sandbox analysis to detect and stop malware threats discovered between signature updates before they can spread throughout an organization, with real-time look-up to our Global Threat Intelligence database, providing you with the latest in malware protection.
Security Rating Service
Stay on track of your Security Roadmap and Target Security Maturity level with measurable and meaningful feedback in the form of actionable Configuration Recommendations, and Key Performance/Risk Indicators. Build Senior Management Confidence by demonstrating effective business asset protection and compliance with regulatory requirements.
Aggregates real-time threat data from Fortinet's threat sensors, Cyber Threat Alliance, and other global resources. Provides protection against malicious web and botnet attacks, blocks large scale DDoS attacks from known infected sources and blocks access from anonymous and open proxies. Real-time IP reputation updates and analysis tools with Geo IP origin of attack.
Block and monitor web activities to assist customers with government regulations enforcement of corporate internet usage policies. FortiGuard's massive web-content rating databases power one of the industry's most accurate web-filtering services. Granular blocking and filtering provide web categories to allow, log, or block Comprehensive URL database provides rapid and comprehensive protection. Fortinet's Credential Stuffing Defense identifies login attempts using credentials that have been compromised using an always up-to-date feed of stolen credentials.
Automated content updates & latest malware and heuristic detection engines, proactive threat library protects against all known threats and variants, Content Pattern Recognition Language and new patented code recognition software protects against unknown variants and guaranteed SLAs to address severe malware threats.
FortiGuard's App Control protects managed assets by controlling network application usage. The sophisticated detection signatures identify Apps, DB applications, web applications and protocols, both blacklist and white list approaches can allow or deny traffic. Traffic shaping can be used to prioritize applications and flexible policies enable full control of attack detection methods.
Vulnerability scan network assets for security weaknesses, with on demand or scheduled scans. Comprehensive reports on the security posture of your critical assets and automated scanning of remote location FortiGates for compliance requirements.
Web Application Firewall (WAF)
Protects against SQL injection, cross-site scripting and various other attacks, hundreds of vulnerability scan signatures, data-type and web robot patterns, and suspicious URLs, Automated updates of WAF signatures, Supports PCI DSS compliance by protecting against OWASP top-10 vulnerabilities and using WAF technology to block attacks.
FortiGuard Indicators of Compromise (IOC)
The IOC service is an automated breach defense system that continuously monitors your network for attacks, vulnerabilities, and persistent threats. It provides protection against legitimate threats, guarding customer data and defending against fraudulent access, malware, and breaches. It also helps businesses detect and prevent fraud from compromised devices or accounts.
Protects ICS and SCADA of OT organization better by blocking or restricting access to risky industrial protocols. Gives you visibility and control of hundreds of industrial applications and lets you add custom applications. Provides real-time threat intelligence updates to battle advanced cyber threats. Supports major ICS manufactures to provide vulnerability protection.
Dual-pass detection technology reduces spam at the network perimeter. Flexible configuration and no-hassle implementation. Allows anti-spam filtering policies. Advanced anti-spam detection capabilities provide greater protection than standard real-time blacklists.
Fully-automated updates protect against the latest threats targeting mobile platforms. Employs advanced virus, spyware, and heuristic detection techniques to thwart new and evolving mobile threats.
- Technical Specs
Global UPC No Manufacturer Fortinet Supplier No Subscription Service Unified (UTM) Protection 8x5 Subscription Length No Subscription Length (New) No Special Sales Message No