Do you have a question about the Fortinet FortiClient and is the answer not in the manual?
Category | Endpoint Security |
---|---|
VPN Support | Yes |
Antivirus | Yes |
Antivirus Engine | FortiGuard |
Web Filtering | Yes |
Application Firewall | Yes |
Application Control | Yes |
Device Control | Yes |
Integration | Fortinet Security Fabric |
License | Subscription-based |
Operating Systems | Windows, macOS, Linux |
VPN Protocols | IPsec, SSL |
Web Filtering Features | URL Filtering |
Centralized Management | Yes, via FortiManager |
Provides comprehensive protection against viruses, spyware, keyloggers, Trojans, adware, and grayware.
Empowers secure access to enterprise applications with DES / 3DES encryption.
Monitors network traffic and enforces application access control.
Built-in antispam for Outlook and SMS, protecting against spam.
Provides real-time web content access enforcement for compliance.
Blocks calls except whitelisted callers and forwards blocked calls.
Encrypts contacts/SMS, secure notebook, file encryption.
Speeds services like VPN for remote PC connections over the WAN.
FortiClient protects against viruses, spyware, adware, keyloggers, dialers, and grayware.
Shows the layered protection components within FortiClient PC.
FortiClient thwarts network reconnaissance, sniffing, and worms with firewall/VPN.
Visualizes FortiClient PC's network defense mechanisms.
Unsanctioned web content and spam threaten productivity and compliance.
Shows how FortiClient enforces web content and spam policies.
Overview of FortiClient deployment in enterprise networks.
Overview of FortiClient deployment in mobile networks.
Lists supported operating systems for FortiClient PC and Mobile.
Details security features available for FortiClient PC.
Details security features available for FortiClient Mobile.
Highlights central management, local updates, and flexible packaging.
Fortinet's system enables quick deployment, configuration, and policy control.
FortiClient deployments scale to unlimited devices with subscription updates.
Unified agent bundles capabilities into a single, low-cost, manageable application.
Lists common security features like antivirus, firewall, and VPN.
Covers client monitoring, update overrides, logging, and configuration lockdown.
Includes extended authentication, management, logging, and VPN tests.
Details file scanning, real-time protection, and automatic submissions.
Covers security zones, advanced rules, access control, and traffic monitoring.
Supports customization, banned lists, and automatic submission of mis-rated emails.
Lists encryption standards like 3DES, DES, SHA-1, MD5, and AES.
Details IKE modes, NAT traversal, redundant gateways, and split tunneling.
Covers categories, HTTPS inspection, block profiles, and bypass lists.
Specifies requirements for PC compatibility, OS, and disk space.
Lists requirements for ARM processor, OS, and disk space for mobile devices.
Includes automatic updates, virus protection, and web category ratings.
Optional support services including 8x5, 24x7, and premium support.