FortiClient is a top performer and "Recommended" by NSS labs in its 2018 Advanced Endpoint Protection (AEP) group test. NSS Labs expanded the scope of the AEP test and included malware, exploits, blended threats (combinations of threats), false positives, and evasions. FortiClient with integrated Sandbox blocked 100% exploits, 100% document and script-based attacks; 100% web and email attack, and offline threats with zero false positives.
As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.
The deep real-time visibility into the network allows administrators to investigate and remotely quarantine compromised endpoints. Endpoint protection is more than just antimalware protection, the endpoint compliance and vulnerability detection features enable simplified enforcement of enterprise.
FortiClient is an integral part of Fortinet Security Fabric. It connects endpoints with Security Fabric and delivers endpoint visibility, compliance control, vulnerability management and automation.
FortiClient shares endpoint telemetry with Security Fabric and with release 6.0 FortiOS & FortiAnalyzer leverage this telemetry intelligence to identify Indicators of Compromise (IoC).
By utilizing the automation capabilities of FortiClient administrators can set policies to automatically quarantine suspicious or compromised endpoints in order to contain incidents and stem outbreaks.
As a next-generation endpoint protection solution, FortiClient helps connect endpoints to FortiSandbox, which uses behaviour-based analysis to automatically analyze in real-time all files downloaded to FortiClient endpoints. Millions of FortiClient and FortiSandbox users worldwide share information about known and unknown, malware with cloud-based FortiGuard. FortiGuard automatically shares the intelligence with other FortiSandbox units and FortiClient endpoints to prevent attacks from known and unknown malware. By integrating with FortiSandbox and cloud-based FortiGuard Global Threat Intelligence, FortiClient automatically detects and prevents zero-day, advanced malware and known threats.
FortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet-connected remote location. FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. Two-Factor authentication can also be used to provide an additional layer of security.
FortiClient for Linux protects Linux desktops and servers against malware by leveraging real-time scanning and detecting vulnerabilities before attackers can exploit them. FortiClient also utilizes Sandbox threat intelligence to detect and block zero-day threats that have not been seen before.
The FortiClient Fabric Agent module aids in integrating Linux endpoints with other devices in the Fortinet Security Fabric, providing in-depth visibility into your attack surface for real-time risk awareness and quick reponse to your most serious threats.
FortiClient anti-exploit technology protects your endpoint against advanced threats including zero-day attacks, which target application vulnerabilities that have yet to be discovered or patched. Our advanced technology provides an additional layer of protection by monitoring the host memory to detect and block various memory techniques including return-oriented programing (ROP), heap spraying, and others.
With an ever growing number of endpoints (workstations, servers, laptops, tablets and smart phones) in an organization, the management of IT assets is becoming a challenge. Without real-time central management, it is hard to monitor the attack surface, manage vulnerabilities, enforce security compliance, and track changes.
Your free trial includes access to all central management features.
With the new Software Inventory module administrators gain visibility into software installed on the endpoint. In addition to managing licenses software inventory can improve security hygiene. When installed software is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise. Companies can set policy to remove outdated & unwanted applications.