Next Generation Endpoint Protection

Integrated endpoint protection platform that provides automated next-generation threat protection, visibility and control of your software and hardware inventory across the entire security fabric. Identify & remediate vulnerable or compromised hosts across your attack surface.
Devices image
  • Provides Endpoint Visibility & Compliance throughout security fabric
  • Prevent Known Vulnerabilities from Being Exploited by Attackers
  • Automated behaviour based protection against unknown threats
  • Simplified Endpoint Management
Your download comes with regular updates to ensure the latest threat data and intelligence is protecting your devices.
FC main logo
Certified imageNSS Labs image
FortiClient Blocks 100 Percent Malware in NSS Labs 2019 Advanced Endpoint Test

In this year’s test, which included 19 endpoint security vendors, Fortinet’s FortiClient demonstrated a 100% block rate of exploits, unknown threats and HTTP malware, with zero false positives. It also demonstrated high effectiveness in detecting malicious malware across multiple vectors, including email, web, and USB (for offline threats), and was proven resistant to all evasion techniques. As a result, FortiClient has received NSS Labs' coveted 'Recommended' rating for the third straight year with low TCO.

Security Fabric image mobile
Integrate Endpoints to Fortinet Security Fabric

As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.

The deep real-time visibility into the network allows administrators to investigate and remotely quarantine compromised endpoints. Endpoint protection is more than just antimalware protection, the endpoint compliance and vulnerability detection features enable simplified enforcement of enterprise.

Automation image
Automated Security Fabric Protection

FortiClient is an integral part of Fortinet Security Fabric. It connects endpoints with Security Fabric and delivers endpoint visibility, compliance control, vulnerability management and automation.

FortiClient shares endpoint telemetry with Security Fabric and with release 6.0 FortiOS & FortiAnalyzer leverage this telemetry intelligence to identify Indicators of Compromise (IoC).

By utilizing the automation capabilities of FortiClient administrators can set policies to automatically quarantine suspicious or compromised endpoints in order to contain incidents and stem outbreaks.

Vulnerability Management
FortiClient Vulnerability Management solution helps you detect OS and third-party Application vulnerabilities in real time across your attack surface.
Screen Detect image
Detect OS & third-party application vulnerabilities that can be exploited by attackers.

Enhanced Security Fabric Integration with Dynamic Access Control

FortiClient EMS creates virtual groups based on endpoint security posture. These virtual groups are then retrieved by FortiGate and used in firewall policy for dynamic access control. These dynamic groups help automate & simplify compliance to security policies.

Mobile Dynamic Access image

ATP image
Automated Advanced Threat Protection and Detection

As a next-generation endpoint protection solution, FortiClient helps connect endpoints to FortiSandbox Cloud, which uses behaviour-based analysis to automatically analyze in real-time all files downloaded to FortiClient endpoints. Millions of FortiClient and FortiSandbox users worldwide share information about known and unknown malware with cloud-based FortiGuard. FortiGuard automatically shares the intelligence with other FortiSandbox units and FortiClient endpoints to prevent attacks from known and unknown malware. By integrating with FortiSandbox Cloud and cloud-based FortiGuard Global Threat Intelligence, FortiClient automatically detects and prevents zero-day, advanced malware and known threats.

Remote Access image
Secure Remote Access

FortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet-connected remote location. FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. Two-Factor authentication can also be used to provide an additional layer of security.

FCT Linux image
FortiClient for Linux

FortiClient for Linux protects Linux desktops and servers against malware by leveraging real-time scanning and detecting vulnerabilities before attackers can exploit them. FortiClient also utilizes Sandbox threat intelligence to detect and block zero-day threats that have not been seen before.

The FortiClient Fabric Agent module aids in integrating Linux endpoints with other devices in the Fortinet Security Fabric, providing in-depth visibility into your attack surface for real-time risk awareness and quick reponse to your most serious threats.

Feature Highlights
  • Detects & Quarantines Malware using real-time, on-demand or scheduled scans
  • Leverages Sandbox Threat Intelligence for behaviour-based detection
  • Supports Security Fabric Telemetry for Attack Surface Visibility
  • Proactive prevention Vulnerability Detection & Patching
  • Central Management using FortiClient EMS
AntiExploit image
FortiClient Anti-Exploit

FortiClient anti-exploit technology protects your endpoint against advanced threats including zero-day attacks, which target application vulnerabilities that have yet to be discovered or patched. Our advanced technology provides an additional layer of protection by monitoring the host memory to detect and block various memory techniques including return-oriented programing (ROP), heap spraying, and others.

Anti-Exploit Highlights
  • Protects against zero-day or undiscovered application vulnerabilities
  • Protects against various memory techniques used in an exploit
  • Protects against drive-by download attacks
  • Shields web browsers (Internet Explorer, Chrome, Firefox, Opera), Java/Flash plug-ins, Microsoft Office applications, and PDF readers
  • Detects & blocks the use of exploit kits
  • Signature less solution
Endpoint image
Simplified Endpoint Management

With an ever growing number of endpoints (workstations, servers, laptops, tablets and smart phones) in an organization, the management of IT assets is becoming a challenge. Without real-time central management, it is hard to monitor the attack surface, manage vulnerabilities, enforce security compliance, and track changes.

Key Features
  • Remote FortiClient Deployment
  • Windows AD Integration
  • Automatic Provisioning of New Devices
  • Centralized Client Provisioning & Monitoring
  • Dashboard Providing Endpoint Alerts and Summary
  • Vulnerability Management
  • Software Inventory Management
  • Automatic Group Assignment
Software Inventory Management image
Software Inventory Management

With the new Software Inventory module administrators gain visibility into software installed on the endpoint. In addition to managing licenses software inventory can improve security hygiene. When installed software is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise. Companies can set policy to remove outdated & unwanted applications.