In this year’s test, which included 19 endpoint security vendors, Fortinet’s FortiClient demonstrated a 100% block rate of exploits, unknown threats and HTTP malware, with zero false positives. It also demonstrated high effectiveness in detecting malicious malware across multiple vectors, including email, web, and USB (for offline threats), and was proven resistant to all evasion techniques. As a result, FortiClient has received NSS Labs' coveted 'Recommended' rating for the third straight year with low TCO.
As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.
The deep real-time visibility into the network allows administrators to investigate and remotely quarantine compromised endpoints. Endpoint protection is more than just antimalware protection, the endpoint compliance and vulnerability detection features enable simplified enforcement of enterprise.
FortiClient is an integral part of Fortinet Security Fabric. It connects endpoints with Security Fabric and delivers endpoint visibility, compliance control, vulnerability management and automation.
FortiClient shares endpoint telemetry with Security Fabric and with release 6.0 FortiOS & FortiAnalyzer leverage this telemetry intelligence to identify Indicators of Compromise (IoC).
By utilizing the automation capabilities of FortiClient administrators can set policies to automatically quarantine suspicious or compromised endpoints in order to contain incidents and stem outbreaks.
FortiClient EMS creates virtual groups based on endpoint security posture. These virtual groups are then retrieved by FortiGate and used in firewall policy for dynamic access control. These dynamic groups help automate & simplify compliance to security policies.
As a next-generation endpoint protection solution, FortiClient helps connect endpoints to FortiSandbox Cloud, which uses behaviour-based analysis to automatically analyze in real-time all files downloaded to FortiClient endpoints. Millions of FortiClient and FortiSandbox users worldwide share information about known and unknown malware with cloud-based FortiGuard. FortiGuard automatically shares the intelligence with other FortiSandbox units and FortiClient endpoints to prevent attacks from known and unknown malware. By integrating with FortiSandbox Cloud and cloud-based FortiGuard Global Threat Intelligence, FortiClient automatically detects and prevents zero-day, advanced malware and known threats.
FortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet-connected remote location. FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. Two-Factor authentication can also be used to provide an additional layer of security.
FortiClient for Linux protects Linux desktops and servers against malware by leveraging real-time scanning and detecting vulnerabilities before attackers can exploit them. FortiClient also utilizes Sandbox threat intelligence to detect and block zero-day threats that have not been seen before.
The FortiClient Fabric Agent module aids in integrating Linux endpoints with other devices in the Fortinet Security Fabric, providing in-depth visibility into your attack surface for real-time risk awareness and quick reponse to your most serious threats.
FortiClient anti-exploit technology protects your endpoint against advanced threats including zero-day attacks, which target application vulnerabilities that have yet to be discovered or patched. Our advanced technology provides an additional layer of protection by monitoring the host memory to detect and block various memory techniques including return-oriented programing (ROP), heap spraying, and others.
With an ever growing number of endpoints (workstations, servers, laptops, tablets and smart phones) in an organization, the management of IT assets is becoming a challenge. Without real-time central management, it is hard to monitor the attack surface, manage vulnerabilities, enforce security compliance, and track changes.
With the new Software Inventory module administrators gain visibility into software installed on the endpoint. In addition to managing licenses software inventory can improve security hygiene. When installed software is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise. Companies can set policy to remove outdated & unwanted applications.