FortiAnalyzer

Networks are constantly evolving due to threats, organizational growth, or new regulatory/business requirements. Traditional analysis products focus on recording and identifying company-wide threats through logging, analysis, and reporting over time. FortiAnalyzer offers the features to identify these threats, as well as providing flexibility to evolve along with your ever-changing network. FortiAnalyzer minimizes the effort required to monitor and maintain acceptable use policies, as well as identify attack patterns.
Explore the web-based interface for our logging, reporting, and analysis product. FortiAnalyzer accepts inbound logs from multiple downstream FortiGate, FortiMail, and FortiWeb devices. It presents an aggregate view of how applications, web usage, and potentially malicious behavior affect your network. Functions such as viewing/filtering event logs, generating security reports, behavior-based alerting, and activity investigation are all key features of FortiAnalyzer.
Features & Benefits
  • Secure data aggregation from multiple FortiGate® and FortiMail™ security appliances provides network-wide visibility and compliance
  • Over 300 customizable reports help monitor and maintain identify attack patterns, acceptable use policies, and demonstrate policy compliance
  • Network capacity and utilization data reporting you to plan and manage networks more efficiently
  • Fully integrated with FortiManager™ appliances for a single point of command, control, analysis, and reporting
  • Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks
  • Up to 6 TB of log data capacity and choice of RAID levels allow you to balance capacity and data assurance to match organizational needs
  • Network event correlation to enable quick response to threats across the network
  • Forensics and drill-down capabilities for auditing suspicious activity
  • Highly customized reports to meet your business needs
  • Choice of operating modes: can be deployed for analysis, collection (forwarder), or log fetching
  • Seamless integration with Fortinet portfolio products

Leave a comment

Hey, so you decided to leave a comment! That's great. Just fill in the required fields and hit submit. Note that your comment will need to be reviewed before its published.