fortinet maxtec

Keeping you ahead of threats

The Fortinet Security Fabric continuously assesses the risks and automatically adjusts to provide comprehensive real-time protection across the digital attack surface and cycle.

Powered by FortiOS, the Fabric is the industry’s highest-performing integrated cybersecurity platform with a rich ecosystem. The Fabric enables consistent security across the extended digital attack surface. Seamless interoperability, complete visibility, and granular control are now possible for hybrid deployments including hardware, software, and X-as-a-Service across networks, endpoints, and clouds.

Today’s enterprises need a broad, integrated, and automated cybersecurity mesh platform that provides centralised management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.

While Gartner calls this idea a “Cybersecurity Mesh Architecture,” for more than a decade Fortinet have called it the “Fortinet Security Fabric.” Fortinet spearheaded the doctrine that a broad, integrated, and automated cybersecurity mesh platform is essential to reducing complexity and increasing overall security effectiveness across today’s expanding networks.

CTAPs in Your Sales Cycle Help You:

Accelerate purchase decisions

Control and manage the sales conversation

Become a subject matter expert and trusted advisor

Increases your close rate to nearly 90%

The Fortinet CTAP Difference

Superior Visibility

Fortinet solutions are powered by content security and threat intelligence from FortiGuard Labs, who work constantly to identify emerging applications and protect enterprises against new threats.

Fortinet Security Fabric Cross Selling Opportunities

The CTAP can uncover additional opportunities where the broad and integrated Security Fabric comes into play – analytics, sandboxing, and more.

Deployment Flexibility

CTAPs allow multiple deployment options in order to minimize network disruption. This allows you flexibility to meet your customer needs while demonstrating real value to their organization.

Actionable Recommendations

Each assessment report includes a set of actionable recommendations that technical staff can use to refine their security and network utilization.

Request a Free Cyber Threat Assessment Below and one of our consultants will get back to you to.

The Fortinet Partner Program offers you the ability to add different Business Models to sell and consume Fortinet Solutions.

Choose between 1, 2 or all 3 Business Models – you decide!



  • Eligible for FortiRewards Program
  • Eligible for Specialization
  • Featured on Partner Locator
  • Direct Access to Fortinet Support
  • Preferential access to Joint Marketing Funds


  • 1 NSE 4



  • “Sell to” Specific Discounting (for internal needs)
  • Featured on Partner Locator
  • SAAS solution
  • Direct Access to Fortinet Support*
  • Eligible for Marketing Funds


  • Fortinet MSSP Questionnaire
  • 1 NSE 4
  • 1 NSE 5



  • Ability to purchase VM solutions via Distribution which can be installed in a Public Marketplace (BYOL)
  • Access to Pay-as-you-Go (PAYG or on-Demand) discounts:
  • 15%: AWS CPPO, Azure, GCP, OCI, AliCloud
  • 20% AWS SPPO


  • Partner must have an existing relationship with a Cloud Provider  (AWS, Azure, GCP, OCI, AliCloud)
  • 1 NSE 4 (recommended)
  • 1 NSE 6 (exam – FortiMail or FortiWeb recommended)
  • NSE 7 (Cloud)


Each Specialization earns you a badge, recognition on the Partner Locator, and discounted not-for-resale kits designed for each focus area. You’ll also gain access to our communities where you can engage, learn, and network with other Fortinet enthusiasts.

SD-WAN Specialized partners are validated by Fortinet to provide digital transformation for organizations with better application experience, reduce costs, and simplify operations at the WAN edge.

LAN Edge and SD-Branch Specialized partners have proven their ability to provide a converged networking and security solution to deliver the most secure wired and wireless offering in the networking industry, with SD-Branch capabilities to extend the WAN edge to distributed branch offices.

Data Center Specialized partners are validated to provide NGFWs that deliver real-time and actionable threat intelligence for critical risk management against the latest threats to IT infrastructure.

Adaptive Cloud Security Specialized Partners are certified to provide Fortinet’s Adaptive Cloud Security that natively integrates network, application, and platform security solutions to support and enhance digital innovation.

Security Operations Specialized partners can deliver consistently top-rated protection, detection and response integrated across the expanding digital attack surface.

Operational Technology Specialized partners can deliver security as the number of internet-enabled, agentless IoT devices expand in number as organizations adopt new digital technologies, creating an intersection of industrial and internet-connected corporate networks.

Zero Trust Access Specialized partners are validated to deliver solutions that help customers improve visibility of all users and devices on and off the network, enable advanced protection, and implement dynamic access control.

Please enter your details to download the Specialised Partner NFR Kit

Mitigating OT Cyber Risk With the Fortinet Security Fabric

Digital transformation (DX) is accelerating operational technology (OT)* and information technology (IT) convergence and driving businesses forward. Organizations leverage digital technologies such as Internet of Things (IoT), cloud computing, artificial intelligence (AI), and others to optimize operations, improve safety and reliability, and gain a competitive edge. However, despite the many benefits, both the convergence of OT and IT and the increased implementation of digital technologies have expanded the OT attack surface and increased its vulnerability to cyber threats.

Strategies for OT Cybersecurity Leaders

How then can organizations mitigate OT cyber risk? The answer is with the Fortinet Security Fabric, a transformative and unique security architecture. The Security Fabric integrates best-in-class security solutions to provide broad visibility across both the OT and IT attack surface, while automating operations and providing continuous trust assessments. Following five cybersecurity best practices can strengthen the OT cybersecurity posture and components of the Security Fabric map to each of them. In this way, the Fortinet Security Fabric can serve as a secure foundation for converging IT and OT environments.

*OT is synonymous with industrial control systems (ICS). “OT” was coined as a term to contrast with IT, because OT protocols, vendors, and use cases are distinct. Supervisory control and data acquisition (SCADA) systems are an element of OT. SCADA systems use graphical user interfaces for high-level supervisory management of OT/ICS processes.

Secure SD-WAN

As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to SD-WAN. SD-WAN is a software-defined wide-area network architecture to enable digital innovations. SD-WAN solutions transform an organization’s capabilities by leveraging the corporate WAN as well as multi-cloud connectivity to deliver high-speed application performance at the WAN Edge of branch sites. SD-WAN provides a dynamic path selection between—MPLS, 4G/5G, or broadband—ensuring organizations can quickly and easily access business-critical cloud applications. But SD-WAN solutions don’t provide in-built security which is critical for direct internet access. Secure SD-WAN enables organizations to enable NGFW with SD-WAN in simplified offering.

Application Resiliency

With traditional WAN solutions, organizations suffer a less than ideal quality of experience and have a hard time delivering high-performance bandwidth for critical applications. Since legacy WAN architectures are IP-based, they lack in-depth application visibility. SD-WAN solutions, however, can enable deep application visibility. This visibility can also be extended into encrypted traffic, which is critical, as more than 80% of the traffic runs on SSL/TLS. With advanced WAN remediation capabilities, enterprises can achieve application resiliency for business-critical applications, improve employee user experience, and boost productivity.

Zero-Touch Deployment

SD-WAN, which is based on the same methodology as software-defined networking (SDN), enables faster deployment with zero-touch provisioning capabilities that scale. In addition, a unified management console for both network and security operations simplifies operations at the WAN edge and extends zero-touch provisioning to LAN edge services, as well as wireless and switching.

Centralized Orchestration

SD-WAN Orchestrator allows organizations to simplify centralized deployment and establish automation to save time and respond more quickly to business demands. A centralized orchestrator can provide an intuitive workflow for business policies to strategize distribution of applications, and other traffic, across and between branch offices. With automated VPN overlay bring-up, meshed connectivity across regional hubs and branch offices, especially in larger SD-WAN deployments, is easily managed with minimal overhead. Enhanced analytics for WAN link availability, performance SLAs, application traffic in runtime, and historical stats allow the infrastructure team to troubleshoot and quickly resolve network issues.

Multi-Cloud On-Ramp

Enabling efficient connectivity to the cloud is a core capability of SD-WAN. SD-WAN solutions can be used in public clouds to enable high-performance connectivity between public cloud workloads running on multiple clouds without increasing cost and complexity. Cloud on-ramp is a key SD-WAN capability to enable faster branch–to-cloud connectivity and orchestration. This simplifies deployment and improves agility.

Download the Solutions Briefs

Stop Ransomware & Phishing and Protect the Entire Business from Infection and Spread

Ransomware continues to be the prevailing form of malware used by attackers for illicit gain and to cause disruption. For many organizations, the loss of critical business cycles and revenues from systems that have ground to a halt far outweigh the price of the ransom itself. With so many potential points of entry, businesses need complete security to ward off this ongoing threat.

The Fortinet Security Fabric brings end-to-end security to organizations of all sizes to prevent ransomware across all points of entry. Powered by intelligence from FortiGuard Labs, Fortinet combines market-leading prevention, detection and mitigation with top-rated threat intelligence to combat today’s most advanced threats.

XDR Defined and Explained

Extended detection and response (XDR) is a natural extension of the endpoint detection and response (EDR) concept, in which behaviors that occur after threat prevention controls act are further inspected for potentially malicious, suspicious, or risky activity that warrant mitigation. The difference is simply the location (endpoint or beyond) where the behaviors occur.

XDR solutions are increasingly popular as organizations recognize the inefficiencies, and in many cases ineffectiveness, of security infrastructures comprised of many individual “best-of-breed” security products deployed from different vendors over time. Common challenges arising from this point-product approach include:

  • Gaps in security: with each product operating in its own silo, opportunities often arise for cyberattacks to enter in between
  • Too much security information: with each product generating individual alerts and other information, security teams can easily miss indicators of cyberattacks
  • Uncoordinated response: with each product operating independently, it falls on the human operator to share information and coordinate response actions

Based on these experiences, many organizations are looking to consolidate security vendors and products in favor of integrated solution sets.

Cross-product Incident Identification

Fortinet continually develops analytics to match constantly evolving cyberattacks and techniques. These are applied to the correlated telemetry collected across the Security Fabric to identify potential cybersecurity incidents.

AI-powered Investigation

Fortinet continually trains a neural network-based decision engine to replicate the steps an expert SOC analyst would take to investigate and classify potential incidents with the aid of microservices.

Automatable Response

Fortinet provides a straightforward remediation framework that enables each organization to predefine, in a granular way, the appropriate steps to be taken based on classification, individual/group, and other considerations.

Secure SD-Branch Facilitates Digital Innovation

Fortinet Secure SD-WAN technology is integrated with network access to deliver the most secure and manageable remote branch in the industry. To address the explosion of IoT devices, Fortinet Secure SD-Branch further utilizes FortiGate next-generation firewall capabilities to offer NAC services onboard. Administrators can not only discover and secure IoT devices, but also detect anomalies by using FortiGate as a network sensor for our FortiNAC product.

Secure SD-Branch follows the Fortinet security-driven networking philosophy, powered by FortiLink, which integrates wired and wireless services into the security infrastructure through FortiOS. Key FortiLink benefits include a common management platform and integrated security, enabling Ethernet switch and WLAN interfaces to be controlled with the same level of enforcement as firewall interfaces. FortiLink switch and wireless integration requires no license. It is included as part of the FortiOS running on every FortiGate.

Extend the benefits of the Fortinet Security Fabric

Fortinet SD-Branch enables customers to converge their security, WAN, and LAN, extending the benefits of the Fortinet Security Fabric to their distributed branches. Secure SD-Branch is comprised of FortiGate Secure SD-WAN, FortiSwitch, and FortiAP to deliver consolidation of branch services for LAN edge. To extend protection to the device edge, built-in NAC features in our FortiOS operating system allow for secure onboarding of devices. Additional real-time auditing of device behavior can be obtained by adding FortiNAC network access control capabilities.

FortiSOAR Overview

As the digital attack surface expands, security teams must also expand their defense capabilities. Yet, adding more security monitoring tools is not always the answer. Additional monitoring tools mean more alerts for security teams to investigate and more context switching in the investigation process, among other issues. This creates a number of challenges for security teams, including alert fatigue, a lack of qualified security personnel to manage new tools, and slower response times.

Integrated into the Fortinet Security Fabric, FortiSOAR security orchestration, automation and response (SOAR) remedies some of the biggest challenges facing cybersecurity teams today. Allowing security operation center (SOC) teams to create a custom automated framework that pulls together all of their organization’s tools unifies operations, eliminating alert fatigue and reducing context switching. This allows enterprises to not only adapt, but also optimize their security process.

FortiSOAR Overview | Security Orchestration Automation and Response

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams.

FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real-time. In this video, you’ll see how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind one unified interface.

Features and Benefits

Incident Management

Enterprise-grade customizable incident management enables SOC analysts to efficiently investigate alerts and better understand, review, and manage incidents

Automated Workflows

Leverage the most advanced playbook engine to create workflows within the product and integrate into existing enterprise tools. 200+ playbooks enable teams to easily onboard

FortiSOAR for MSSPs

Create a unique managed security service provider (MSSP)-enabled customer centric dashboards, workflows, and views to enable easy security operations management across customer segments

SOC Dashboards and Reports

A built-in advanced visual dashboard enables customers to easily create dashboards specific to a role within security operations

Partner Connectors

Integrate existing enterprise security solutions. FortiSOAR comes with 280+ partner connectors to existing vendors across SIEM, network security, endpoint, cloud, and more

Queue Management

Built-in queue management handles automatic work assignments across multiple queues and teams within the SOC

FortiEDR Product Details

FortiEDR is the only endpoint protection solution that provides both comprehensive machine-learning anti-malware execution and real-time post-infection protection. From day one, it automatically detects and defuses potential threats in real time even on already infected hosts. The defusing post-infection protection layer controls outbound communications and file systems modifications to prevent data exfiltration, lateral movement and C2 communications, as well as file tampering and ransomwares.

With automated EDR functions for threat hunting and incident response, FortiEDR eliminates the breach response time gap, dwell time, and alert fatigue. Additionally, it protects systems and supports broad OS coverage workstations, servers, and virtual machines, including legacy operating and embedded systems.

FortiEDR Overview

Advanced attacks can take just minutes, if not seconds, to compromise the endpoints. First-generation endpoint detection and response (EDR) tools simply cannot keep pace. They require manual triage and responses that are not only too slow for fast moving threats but they also generate a huge volume of indicators that burden already overstretched security teams. Further, legacy EDR tools drive up the cost of security operations and can slow processes, negatively impacting business.

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks. FortiEDR helps organizations stop breaches in real-time automatically and efficiently, without overwhelming security teams with a slew of false alarms or disrupting business operations.

Secure Remote Access for Your Workforce at Scale

The ability to securely support a remote workforce is an essential component of any organization’s business continuity and disaster recovery plan. An organization may be incapable of sustaining normal operations onsite, due to a power outage or similar event, or illness or flooding may make it unsafe for employees to travel onsite.

In these scenarios, an organization must be capable of supporting secure, remote connectivity to the corporate network. For over 400,000 Fortinet customers, their existing technology deployment already contains this functionality. FortiGate NGFWs have integrated support for IPsec VPNs, enabling secure connectivity for employees working from alternate work sites.

Securing the Remote Workforce with FortiGate NGFWs

The IPsec and SSL VPNs integrated into every FortiGate NGFW offer an extremely flexible deployment model. Remote workers can either take advantage of a clientless experience or gain access to additional features through a thick client built into the FortiClient endpoint security solution. Power users and super users would benefit from deploying a FortiAP or a FortiGate NGFW for additional capabilities.

Fortinet customers that deploy FortiGate solutions in the cloud, on-premise, or at remote locations are able to take advantage of its single pane of glass management, enabling the control and orchestration of multiple firewalls across locations to establish and maintain consistent security and user experience. Fortinet understands that business performance largely depends on user productivity, access to content and applications, at any location, at any time. With remote access and the ability to manage performance across locations using Secure SD-WAN as a core capability the Fortinet Security Fabric securely provides flexible options for mobile and fixed access to cloud resources at massive scale.


One-Time Password Application Software Token

FortiToken Mobile: An application for iOS or Android providing strong authentication security without additional hardware.

  • OATH compliant, time-based OTP
  • No hardware necessary

Passwords alone don’t keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security.  Authorized employees can access company resources safely using a variety of devices, ranging from laptops to mobile phones.

FortiToken Mobile is an application for iOS or Android that acts like a hardware token but utilises hardware the majority of users posses, a mobile phone.

FortiToken Mobile includes:

  • Reduced costs by leveraging existing FortiGate as the authentication server
  • Minimised overhead with unique online activation option
  • A scalable solution for low entry cost and low total cost of ownership

Enterprise Firewall

FortiGates are Security Fabric enabled, providing the broad visibility, automated protection and integrated threat intelligence required to protect the valuable assets and data of organizations worldwide.

FortiGate includes:

  • Consolidated, validated highest efficacy advanced security services
  • Real-time response based on threat intelligence to protect any point of vulnerability in the network
  • Integrated audit and compliance services to improve cybersecurity
  • Industry’s fastest SSL inspection engine to help protect against malware hiding in encrypted traffic
  • Single-pane-of-glass management to simplify deployment and enable consistent security policies with granular control and visibility
  • Multiple network deployments – as a next-generation firewall, data center firewall, internal segmentation firewall, or high speed firewall and VPN

Virtualized Next-Generation Firewall

To provide consistently top-rated security, greater visibility, and unmatched performance, FortiGate virtual appliances give you the unique combination of the most advanced threat intelligence from FortiGuard Labs with a common FortiOS Operating System, simplifying management across physical, virtual, and cloud deployments.

FortiGate virtualized next-generation firewalls include:

  • Top-rated protection with FortiGuard security services as tested by NSS Labs, Virus Bulletin, and AV-Comparatives
  • East-west traffic visibility with granular control of applications, devices, and users
  • Simplified security with easy-to-manage, single platform across physical, virtual, and cloud
  • Actionable reports to enforce policies, understand targeted attacks, and meet compliance
  • Support for all major hypervisor, cloud, and SDN platforms
  • Flexible licensing and provisioning to support on-demand consumption (via service providers)

Secure Wi-Fi

Large campuses, distributed enterprises, and small businesses all have diverse WLAN architecture needs but also a common requirement for security. That’s why Fortinet provides a full suite of WLAN products as part of our Secure Access solution designed to address the unique requirements of every organization.

Configuration and control of your wireless environment can be done directly with a FortiGate or via our Wireless LAN controllers.  Fortinet also offers FortiManager and FortiCloud as management solutions for the entire Fortinet security fabric.

Fortinet Secure Wi-Fi includes:

  • Single-pane-of-glass management for wireless, wired, and security policies
  • Zero-touch deployment – no requirement for onsite tech support
  • Simplicity of the cloud with integrated UTM service in AP (FortiAP S-Series)
  • Industry-leading customer analytics and engagement tools for retailers

Secure Email Gateway Solutions: FortiMail

Email remains the most critical communications tool for business. Unfortunately, that also makes email the top threat vector, with the volume and sophistication of attacks ever-increasing. At the same time, customers are increasingly moving to cloud email providers, like Microsoft 365 and Google G-Suite, and are struggling to secure their email traffic. The built-in, native security tools available in these platforms are by themselves insufficient to guard against attacks, protect valuable data, and ensure compliance objectives are met.

FortiMail is a proven, best-in-class secure email gateway solution used tens of thousands of customers worldwide to protect well over a hundred million mailboxes. FortiMail has been independently validated for high catch-rates, leading accuracy and excellent overall security efficacy by testing firms including SE Labs, VB Labs, ICSA, and NSS, among others. For example, FortiMail was recently awarded a ‘AAA rating’, the top rating a vendor can receive, by SE Labs. (The full ‘Email Security Services Protection’ report is available for download.)

FortiMail is designed to address both inbound traffic, to detect and prevent inbound threats, as well as outbound traffic to enforce policies related to compliance or protecting valuable data assets. Most importantly, the solution works seamlessly with any existing email infrastructure investment, whether on-premise like Exchange or hosted in the cloud, like M365 or G-Suite. In addition, a wide range of deployment options and consumption models are available to address any customer requirement, including the FortiMail Cloud SaaS.

FortiMail can operate in-line as a traditional MTA requiring an MX record change, or out-of-band leveraging APIs to plug seamlessly into M365 environments. This API integration allows customers to perform real-time and internal scanning of email traffic, as well as post-delivery clawback if a message is identified to contain a threat or maps to a defined policy, such as a confidential document.

One of the advantages that separates FortiMail from other products is the backing of it by FortiGuard Labs, including the powerful visibility and real-time threat intelligence feeds provided through this integration. FortiGuard Labs has tremendous insights on global traffic patterns and the evolving threat landscape; each day, for example, FortiGuard Labs has visibility into more than 100 million unique emails. This allows FortiMail customers to benefit from the latest and greatest protection, since spam and virus outbreaks can be identified and stopped as quickly as possible.

Intrusion Prevention System (IPS)

Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses. The protection offered by deep IPS inspection into network traffic is key to stopping today’s sophisticated and targeted attacks.

FortiGate IPS includes:

  • Deep inspection for advanced threats, botnets, zero days and targeted attacks on the network
  • Independent third-party validation to demonstrate superior detection and best price performance
  • Innovative security processor (SPU) technology for high-performance network throughput and deep security inspection
  • Seamless integration – appliance or cloud service – with world-class sandboxing for advanced threats
  • Special security controls for web servers and applications, including cross-site scripting and SQL injection
  • Data protection controls to prevent sensitive data exfiltration


With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats.

While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation.

FortiSandbox includes:

  • Critical protection against advanced and emerging threats
  • Broad integration with Fortinet and third-party security solutions to help protect an organization’s dynamic attack surface
  • Automated sharing of threat intelligence in real time to disrupt attacks early in the cycle without human intervention
  • Flexible form factors to help support various industry requirements

Protecting Your Public Cloud Workloads with Next-Generation Security

The Fortinet Security Fabric delivers consistent end-to-end policies and scales security bandwidth across multiple cloud platforms.

Cloud Firewall includes:

  • Comprehensive advanced security for leading public cloud platforms
  • End-to-end security orchestration and management

Web Application Firewall

Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types. Our multi-layered and correlated approach protects your web apps from the OWASP Top 10 and more. Our Web Application Security Service from FortiGuard Labs uses information based on the latest application vulnerabilities, bots, suspicious URL and data patterns, and specialized heuristic detection engines to keep your applications safe from:

  • Sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, and cookie poisoning
  • Malicious sources
  • DoS attacks

FortiWeb includes:

  • Vulnerability scanning and patching
  • IP reputation, web application attack signatures, credential stuffing defense, anti-virus, and FortiSandbox Cloud powered by FortiGuard
  • Real-time attack insights and reporting with advanced visual analytics toolsIntegration with FortiGate and FortiSandbox for ATP detection
  • Behavioral attack detection
  • Advanced false positive and negative detection avoidance

Secure Switching

FortiSwitch Data Center and Secure Access Switches offer a broad portfolio of secure, simple, and scalable Ethernet solutions for applications that range from desktop to data center. Our Secure Access and Data Center Switches can be managed standalone or integrate directly into the Fortinet Security Fabric via the FortiLink protocol. FortiLink is a key supporting technology of the FortiSwitch, which enables its ports to become logical extensions of our FortiGate security appliance.

Secure switching includes:

  • Security features to protect vulnerable infrastructure with no slowdown
  • Data separation compliance with network segmentation
  • FortiLink port-level network access option, centrally manageable from any FortiGate
  • Ability to enable voice, data, and wireless traffic across a single network
  • High scalability with 1/10 GE or 40 GE port density

Application Delivery Controller

With bandwidth demand growing faster than budgets and cyber-attacks constantly on the rise, it can be challenging to securely and efficiently deliver applications at the speed your users expect. Fortinet Application Delivery Controller (ADC) appliances optimize the availability, user experience, and scalability of enterprise application delivery. They enable fast, secure, and intelligent acceleration and distribution of even the most demanding enterprise applications.

FortiADCs include:

  • Security processor (SPU)-accelerated SSL offloading
  • Application-aware traffic management
  • 24×7 application availability through automatic failover, global server load balancing, and link load balancing to optimize WAN connectivity
  • Web application firewall
  • Bandwidth prioritization with Quality of Service (QoS)
  • Custom scripting

FortiGate Secure Web Gateway

The FortiGate SWG protects against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies. Fortinet is the first and only security vendor to earn Virus Bulletin’s VBWeb certification for web filtering effectiveness. With FortiGate SWG you can realize the benefits of a secure web gateway, while reducing the complexity of maintaining one.

FortiGate SWG includes:

Visibility into encrypted web traffic

Flexible deployment modes covering inline, explicit, and transparent deployments

Authentication of users and enforcement of compliance restrictions using granular web application policies

Integration with NSS Recommended FortiSandbox and FortiClient endpoint technology to protect users from advanced attacks

Network Security Management

Security teams globally are challenged by resource constraints, both in terms of the number of staff and raw security talent. Moreover, security teams are asked to do more, often in more complex networks and with growing numbers of alerts from multiple systems. Successful security teams allay these challenges by implementing three best practices. First, they demand simplified configuration management, shortening deployment time and mitigating misconfiguration due to human error. Second, they build their environment for a single point of inspection, creating the big picture perspective that focuses them on real priorities. Third, they implement next-level analysis to cut through the noise and leverage their own security expertise.

Fortunately, these security operations best practices are embodied in the Fortinet management solution which includes, FortiAnalyzer, FortiManager and FortiCloud.



The complexity of managing network and security operations is resulting in increases in breaches worldwide.  Discovery, isolation, and remediation of these incidents are measured in hundreds of days. And with a dwindling pool of skilled cyber security personnel able to manage the wide array of devices and data sources to protect their network assets, success requires a new approach.

FortiSIEM provides organizations of all sizes with a comprehensive, holistic, and scalable solution for security, performance, and compliance management, from IoT to the cloud.

FortiSIEM includes:

  • Asset Self-Discovery for adaptive awareness of the threat landscape
  • Rapid integrations and scalability for an ever-changing network environment
  • NOC & SOC analytics for rapid detection of potential threats
  • Mult-tenancy for MSPs and segmented enterprise domains
  • Single pane of glass view for consolidated visibility
cyber threat assessment fortinet

Identity Access Management

Establishing identity through secure authentication is important for implementing an effective security policy. Many of today’s most damaging security breaches have been due to users being provided with inappropriate levels of access, or worse—compromised static passwords.

Identity Access Management includes:

  • Intuitive, centralized authentication and authorization services that establish identity in the implementation of security policy
  • Single-sign-on (SSO) for both web/cloud and network resources
  • Two-factor strong authentication and management
  • Guest, BYOD, and certificate management
  • Simple deployment and licensing
fortinet south africa


Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

FortiDDoS includes:

  • 100% security processor (SPU)-based layer 3, 4, and 7 DDoS protection application-aware traffic management
  • Behavior-based DDoS protection to eliminate need for signature files
  • Minimal false-positive detections through continuous threat evaluation
  • Ability to monitor hundreds of thousands of parameters simultaneously
  • Defense against every DDoS attack: bulk volumetric, layer 7 application, and SSL/HTTPS
  • Attack protection for DNS services via specialized tools


FortiNAC is the Fortinet network access control solution. It enhances the overall Fortinet Security Fabric with visibility, control, and automated response for everything that connects to the network. It provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic responses to a wide range of networking events.

FortiNAC enables three key capabilities to secure IoT devices:

  1. Network visibility to see every device and user as they join the network
  2. Network control to limit where devices can go on the network
  3. Automated response to speed reaction time to events from days to seconds

The FortiNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness.

FortiNAC is an ideal solution for any stage or maturity level of a security strategy.

Using FortiNAC, organizations can:

  • Deliver agent and agentless scanning of the network for detection and classification of devices
  • Create an inventory of all devices on the network and assess the risk of every endpoint connected to the network
  • Use a centralized architecture for easy deployment and management
  • Leverage extensive support for third-party network devices to ensure overall effectiveness
  • Enforce dynamic access control
  • Prepare for incident response and reduce containment time to seconds, sometimes from as long as days or weeks
  • Integrate with SIEM solutions to provide detailed contextual data and reduce investigation time
  • Automate the onboarding and permissions process for large numbers of endpoint devices, users, and guests

Please enter your details to download the datasheet

Enabling Partners to Deliver Broad and Integrated Security and Networking Services

Fortinet understands that the MSSP is a strategically differentiated channel partner, and for years has developed technology specifically suited to the MSSP business model to enhance MSSP Partners’ profitability.


Fortinet’s MSSP innovative strategy can best be described in four key pillars or areas of influence: Vision, Technology, Economics, and Support. These areas capture many of Fortinet’s differentiators for MSSPs, and help clarify the reasons for Fortinet’s dominance in the space.
With hundreds of thousands of customer nodes under management, and billions of dollars of assets under their protection, the world’s top MSSPs hold their firewalls to extremely high standards for reliability, functionality, and flexibility. So, when considering solutions to address their complex requirements, Fortinet stands above the crowd of security vendors by providing stable technology combined with specialised support built for carrier-class multi-tenancy and managed services. 

Fortinet enables MSSP partners to create new revenue streams, improve margins, and deliver differentiated services. Fortinet continues to drive market evolution with the security-driven networking solutions that deliver security effectiveness, cost, and performance for use cases spanning enterprises on-premises, multi-cloud environments, branch, and remote deployments.


Discover any device attached anywhere on the IT-OT network, determine the degree of trust, and continuously monitor behavior to maintain a level of trust. Define the attack surface and ensure active device and traffic profiling. Traffic visibility ensures actionable intelligence, and OT security teams can dictate allowed traffic, ports, protocols, applications, and services. Enforcement points within the environment ensure north-south and east-west protection.


Depend on each OT system and subsystem to do its job—and only its job. Multifactor authentication ensures the appropriate people have the appropriate assigned permissions and access. Network segmentation and micro-segmentation provide a layered and leveled approach with zones of control. Sandboxing detects threats on the OT network and automated quarantine prevents them from doing damage.

Continuous Monitoring

Continuous analysis of behaviors in OT networks helps teams learn what, where, when, who, and how by gathering intelligence about known and unknown threats. A central security tool helps with logging, reporting and analytics, and evaluates activity collected across the system. It also provides security information and event management, and security orchestration automation and response capabilities. OT security insights are gained via user and device behavior analysis and threat assessments ensure continuous protection.