FortiClient. Key Highlights. Unified Endpoint Protection Platform. FortiClient DATA SHEET. FortiGuard Security Services

Similar documents
FortiVoice Enterprise

Fortinet FortiGate App for Splunk

Use FortiWeb to Publish Applications

Mobile Configuration Profiles for ios Devices Technical Note

FortiVoice Enterprise

Fortinet Advanced Threat Protection- Part 3

Transforming Your WiFi Network Into A Secure Wireless LAN A FORTINET WHITE PAPER. Fortinet White Paper

MSSP Advanced Threat Protection Service

The Fortinet Advanced Threat Protection Framework

FortiCore A-Series. SDN Security Appliances. Highlights. Securing Software Defined Networking (SDN) Architectures. Key Features & Benefits

SDN Security for VMware Data Center Environments

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

FortiGate/FortiWiFi 60D Series

Purchase and Import a Signed SSL Certificate

FortiGate/FortiWiFi 90D Series

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

FortiAuthenticator TM User Identity Management and Single Sign-On

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

FortiGuard Security Services

FortiClient v5.2 Administration Guide

FortiClient Administration Guide

Securing the Data Center

FortiMail VM (Microsoft Hyper-V) Install Guide

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Segmentation Firewall (ISFW)

FortiGate/FortiWiFi -60C Series Integrated Threat Management for Small Networks

FortiGate 100D Series

Fortinet Secure Wireless LAN

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

FortiGate/FortiWiFi -90D Series Enterprise-Grade Protection for Smaller Networks

The Enterprise Cloud Rush

Cisco Advanced Malware Protection for Endpoints

FortiSandbox. Multi-layer proactive threat mitigation

FortiAnalyzer VM (VMware) Install Guide

Symantec Client Management Suite 8.0

FortiGate 3700D. The Fortinet Enterprise Firewall Solution. One Enterprise Firewall Solution across the Extended Enterprise. Highlights. forti.

FortiGate RADIUS Single Sign-On (RSSO) with Windows Server 2008 Network Policy Server (NPS) VERSION 5.2.3

5 ½ Things That Make a Firewall Next Gen WHITE PAPER

Secure Access Architecture

FortiGate 1500D. The Fortinet Enterprise Firewall Solution. One Enterprise Firewall Solution across the Extended Enterprise. Highlights. forti.

What s New for FortiMail 5.2.0

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests

FortiGate 200D Series

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

WHITE PAPER. Protecting Your Network From the Inside-Out. Internal Network Firewall (INFW)

Supported Upgrade Paths for FortiOS Firmware VERSION

SOLUTION GUIDE. Secure Access Architecture. Enterprise Network Access with Complete Security

FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0

How To Get A Fortinet Security System For Free

Systems Manager Cloud-Based Enterprise Mobility Management

Securing Next Generation Education A FORTINET WHITE PAPER

FortiSwitch. Data Center Switches. Highlights. High-performance and resilient managed data center switch. Key Features & Benefits.

Systems Manager Cloud Based Mobile Device Management

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Fortinet Partner Program

Kaseya IT Automation Framework

FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE

Keeping the Store Open: Fighting the Cyber Criminal in the Retail World

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Improving Profitability for MSSPs Targeting SMBs

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

Remote Access Clients for Windows

WHITE PAPER. Deploying Mobile Unified Communications for Avaya

FortiSandbox. Multi-layer proactive threat mitigation

Symantec Mobile Management 7.2

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Fortinet Certified Network Security Administrator

Symantec Endpoint Protection

Symantec Mobile Management 7.1

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

Symantec Mobile Management Suite

Managing a FortiSwitch unit with a FortiGate Administration Guide

Endpoint protection for physical and virtual desktops

FortiClient dialup-client configurations

Cisco Mobile Collaboration Management Service

How To Secure Your Store Data With Fortinet

SA Series SSL VPN Virtual Appliances

Getting Started with Symantec Endpoint Protection

Proof of Concept Guide

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

FortiAuthenticator v2.0 MR1 Release Notes

Fortinet Connect. Easy to use, flexible user access. Features & Benefits

FortiManager - Secure DNS Guide VERSION 5.4.1

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK

Symantec Mobile Management for Configuration Manager 7.2

Pcounter Mobile Guide

WHITE PAPER. Empowering the MSSP. Part 2: End To End Security Services Ecosystem

Cisco Small Business ISA500 Series Integrated Security Appliances

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Transcription:

DATA SHEET Advanced Endpoint Protection and Enterprise Management Server With a multitude of devices jumping on to the network each day ranging from corporate laptops to BYOD and even IoT, organizations often struggle to identify and secure these devices that are either internal or external to the organization, increasing the risk of a potential data breach. Exacerbating this even further is the lack of security talent to manage the ever increasing number of daily alerts and the cumbersome task of responding to alerts individually often missing the one that matters the most. Key Highlights Fortinet Security Fabric Ready Top-rated Threat Prevention Enterprise-scale Simplified Endpoint Management Small footprint, Lightweight Security Agent Customizable Feature Installation Broad platform coverage including Windows, Mac OS X, Linux, ios and Android Unified Endpoint Protection Platform More than just a traditional endpoint protection, is an endpoint protection platform that secures a multitude of different devices through a combination of endpoint visibility and control, protection and authorized access. integrates with Fortinet s Security Fabric 1 to provide endpoint awareness, compliance and enforcement by sharing endpoint telemetry irregardless of device location e.g. corporate headquarters or a café. At its core, automates prevention of known and unknown threats through its built-in host-based security stack and integration with FortiSandbox. also provides secure remote access to corporate assets via VPN with native Two-Factor Authentication coupled with Single Sign On. 1. Fortinet Security Fabric: https://www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-fortinet-security-fabric.pdf FortiCare Worldwide 24x7 Support support.fortinet.com FortiGuard Security Services www.fortiguard.com

HIGHLIGHTS Security Fabric Integration Unlike other disparate point solutions within a security architecture that fail to communicate with one another, works cooperatively with Fortinet s Security Fabric. This is done by extending it down to the endpoints to secure them via security profiles, by sharing endpoint telemetry to increase awareness of where systems, users and data reside within an organization and by enabling the implementation of proper segmentation to protect these endpoints. Hardware and software inventory Real-time visibility and monitoring Client Security Global Intelligence Alliance Partners At regular intervals, sends telemetry data to the nearest associated FortiGate. This visibility coupled with built-in controls from FortiGate allows the security administrator to construct a policy to deny access for example, endpoints with known vulnerabilities, or to quarantine compromised endpoints with a single click. Endpoint Telemetry User detection and identification Device details e.g. OS details, IP address, MAC address Security information e.g. vulnerabilities, malware detection IoT Secure LAN Access Secure WLAN Access Fortinet Security Fabric Network Security Local Intelligence Cloud Security Application Security Advanced Threat Protection Today s advanced endpoint offering still requires manual effort to assess and fully respond to unknown threats identified. is built on the foundational aspect of automating prevent-detect-mitigate in the threat protection lifecycle. It accomplishes this objective in two ways. Protection against known threats s built-in security stack includes dynamic AV engine, Application Firewall, Vulnerability Scanner with auto-patching and Web Filter working in concert to reduce the attack surface, to prevent polymorphic and common malware, and known exploits from various attack vectors at the endpoint. Protection against unknown threats automates the submission of unknown objects to the highly-rated FortiSandbox that provides detection through validation of an unknown file s hash, or performs dynamic analysis to determine malicious behavior. Advanced malware or Zero-day is mitigated through the sharing of intelligence with to automatically quarantine that object as well as immunize all other endpoints, and with FortiGuard Labs to extend protection to the global community. 2 www.fortinet.com

HIGHLIGHTS Secure Remote Access & Mobility Virtual Private Network (VPN) is necessary and ubiquitous to almost all organizations that offer secure remote access to corporate assets. However, it is usually considered a cumbersome and time consuming task to manage another separate product that may not be the most secure in light of today s targeted attacks. This forces organizations to explore a third party authentication mechanism and integrate into their existing VPN solution. Compounding this issue is scaling with the organization to manage user authentication and complexity of network requirements associated with this. solves these shortcomings by enabling users to roam freely with an always connected VPN client that supports both SSL and IPSec, native two-factor authentication (hardware- or softwarebased) and Single Sign On (SSO). 3

DEPLOYMENT Simplify Management: Enterprise Management Server (EMS) The Enterprise Management Server (EMS) provides end-to-end endpoint deployment, registration, management and monitoring. You can centrally administer endpoint Antivirus, Web Security, Remote Access (IPsec and SSL VPN), Application Firewall, Vulnerability Scanand related advanced features. You can also remotely trigger AV scans and quarantine infected endpoints. Key benefits: Scalable solution to centrally manage up to 100,000 endpoints All-in-one management deploy, manage and monitor s on- or off-premise Integrate and sync with Active Directory (AD) to deploy to all endpoints Easily create security profiles with customizable features such as Application Firewall, applied to specific set of users/devices or for all users/devices Enforce endpoint compliance with FortiGate integration Centrally log and report on endpoint activity with FortiAnalyzer Simplify Enforcement: FortiGate In FortiOS 5.4.1 or later, FortiGate provides compliance enforcement and remediation. When a is registered with FortiGate, settings and status can be matched against assigned profile that includes AV settings, system vulnerabilities detected, and more. FortiGate provides remediation e.g. perform an auto-update of the client, or initiate other actions to enforce endpoint compliance. In addition, FortiGate can quarantine an endpoint to allow security analyst to investigate the compromised endpoint. 4 www.fortinet.com

FEATURES Security Fabric Components Windows Mac OS X Linux Android ios Windows Mobile Endpoint Telemetry 1 Compliance Enforcement 1 (Limited) (Limited) Endpoint Audit and Remediation with Vulnerbility Scanning 1 Advanced Threat Protection Components File Analysis with FortiSandbox Host Quarantine Enforcement 1 Host Security and VPN Components Antivirus Web Filtering Application Firewall 1 IPSec VPN SSL VPN Others Windows AD SSO Agent WAN Optimization 1 Requires FortiGate Endpoint License The list above is based on the latest OS for each platform. EMS and FortiGate Endpoint Licenses EMS License FortiGate Endpoint License Provisioning Custom Install/Rebranding Tool Centralized Client Provisioning Limited, as part of client install enforcement Client Upgrades Limited, as part of client install enforcement Windows AD Integration Configuration Management Distribute Client Settings Complete, including VPN settings Limited, as part of client compliance enforcement (Antivirus, Web Filter and Application Firewall) Endpoint Profiles (Can also import Endpoint profiles from FortiGate) Remote Control Immediate Antivirus Scan Trigger Trigger Immediate Vulnerability Scan Host Quarantine Telemetry and Monitoring Client Information (client version, OS IP/MAC address, profile assigned) Client Status Complete, including AV signature DB update Limited, compliance and online status Reporting (To FortiAnalzyer) (To FortiAnalzyer) 5

SPECIFICATIONS Operating System Supported Microsoft Windows 10 (32-bit, 64-bit), Windows 8.1 (32-bit, 64-bit), Windows 8 (32-bit, 64-bit), Windows 7 (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows XP (32-bit) Windows Server 2008 R2 and Windows Server 2012, 2012 R2 Mac OS X v10.11 El Capitan, OS X v10.10 Yosemite, OS X v10.9 Mavericks and OS X v10.8 Mountain Lion ios 5.1 or later (iphone, ipad, ipod Touch) Android OS 4.0.4 or later (phone and tablet) Encryption AES 128/192/256, DES/3DES Deployment Options Manual Interactive, Manual Silent, Active Directory GPO, Third Party Distribution Tools Authentication Options RADIUS, LDAP, Local Database, xauth, TACACS+, Digital Certificate (X509 format), FortiToken VPN Protocols SSL (Tunnel Mode), IPsec WAN Optimization CIFS, FTP, HTTP, MAPI, General TCP traffiic Connection Options Auto Connect VPN before Windows logon, IKE Mode config for VPN IPsec tunnel Note: All specifcations are based on 5.0. Enterprise Management Software Operating System Supported Microsoft Windows Server 2012, 2012 R2 Microsoft Windows Server 2008 R2 Endpoint Requirement version 5.2.4 or newer, for Microsoft Windows and Mac OS X System Requirements 2.0 GHz 64-bit processor, dual core (or two virtual CPUs) 2 GB RAM 5 GB free hard disk Gigabit (10/100/1000BaseT) Ethernet adapter Internet access ORDER INFORMATION Product SKU Description License Subscription FC-10-C0102-151-02-12 1 Year Endpoint Telemetry & Compliance License Subscription for up to 200 clients. Includes 24x7 support and ability to download the license file, preconfigure Client, create a custom installer and rebrand. FC-10-C0106-151-02-12 1 Year Endpoint Telemetry & Compliance License Subscription for up to 600 clients. Includes 24x7 support and ability to download the license file, preconfigure Client, create a custom installer and rebrand. FC-10-C0103-151-02-12 1 Year Endpoint Telemetry & Compliance License Subscription for up to 2,000 clients. Includes 24x7 support and ability to download the license file, preconfigure the client, create a custom installer and rebrand. (Note: In 5.2 only supported for FG-500 through FG-800 and VM01-VM02 series). FC-10-C0104-151-02-12 1 Year Endpoint Telemetry & Compliance License Subscription for up to 8,000 clients. Includes 24x7 support and ability to download the license file, preconfigure the client, create a custom installer and rebrand. (Note: In 5.2 only supported for FG-1000 series and VM04). FC-10-C0105-151-02-12 1 Year Endpoint Telemetry & Compliance License Subscription for up to 20,000 clients. Includes 24x7 support and ability to download the license file, preconfigure the client, create a custom installer and rebrand. Enterprise Management Software License FC-15-EMS01-158-02-12 Enterprise Management Server Endpoint License for 1 client. Includes 24x7 support and ability to provision all features (including VPN settings), deploy installer, create custom installer, rebrand and monitor endpoints. One license will be issued good for the amount of units requested on PO. Minimum order quantity 100. License stacking for multi-year license for the exact same number of clients is supported. GLOBAL HEADQUARTERS Fortinet Inc. 899 Kifer Road Sunnyvale, CA 94086 United States Tel: +1.408.235.7700 www.fortinet.com/sales EMEA SALES OFFICE 905 rue Albert Einstein Valbonne 06560 Alpes-Maritimes, France Tel: +33.4.8987.0500 APAC SALES OFFICE 300 Beach Road 20-01 The Concourse Singapore 199555 Tel: +65.6395.2788 LATIN AMERICA SALES OFFICE Sawgrass Lakes Center 13450 W. Sunrise Blvd., Suite 430 Sunrise, FL 33323 United States Tel: +1.954.368.9990 Copyright 2016 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary and may be significantly less effective than the metrics stated herein. Network variables, different network environments and other conditions may negatively affect performance results and other metrics stated herein. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet and any such commitment shall be limited by the disclaimers in this paragraph and other limitations in the written contract. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet s internal lab tests, and in no event will Fortinet be responsible for events or issues that are outside of its reasonable control. Notwithstanding anything to the contrary, Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. FST-PROD-DS-CL FCT-DAT-R13-201607