What is Fortinet?
Show LessContact Details
Fortinet, Inc
Located in United States, California, Sunnyvale
Founded in 2000
Best For User Type
- Web Application Protection
- Bot Mitigation
- Application Attack Protection
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Web Application Firewall (Waf) Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Fortinet Pricing
Check out our offers for each of our packages to get best out of the software
Visit us on our website to know more
Get a custom quote
Fortinet Features
Primary Features
Ddos Protection
DDoS Protection Standard applies three auto-tuned mitigation policies (TCP SYN, TCP, and UDP) for each public IP of the protected resource, in the virtual network that has DDoS enabled.
Reporting/Analytics
Reporting summarizes and organizes data in easily digestible ways while analytics enables questioning and exploring that data further.
API
APIs are mechanisms that enable two software components to communicate with each other using a set of definitions and protocols.
Vulnerability Protection
Vulnerability Protection prevents these vulnerabilities from being exploited with easy and fast–to-deploy filters that provide full protection before patches can be deployed.
Vulnerability Scanning
Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.
Threat Intelligence
Threat intelligence is data that is collected, processed, and analyzed to understand a threat actor's motives, targets, and attack behaviors.
Secondary Features
- Application Security
- Behavioral Analytics
- Intrusion Detection System
- Monitoring
- Third Party Integrations
- Encryption
- Policy Management
- Web Traffic Reporting
Compare with Similar Products
Cloudflare WAF
Radware Web Application Firewall
Aws Web Application Firewall
Citrix
Limelight Cloud Web Application Firewall
Microsoft Azure WAF
Sitelock Web Application Firewall
Imperva cloud
Akamai Web Application Firewall
Barracuda Web Application Firewall