The new NSE 5 FortiClient EMS 6.2 course is now available.
Fortinet Fabric Agent for Visibility, Control, and ZTNAProduct Download
FortiClient is a Fabric Agent that that delivers protection, compliance, and secure access in a single, modular lightweight client. A Fabric Agent is a bit of endpoint software that runs on an endpoint, such as a laptop or mobile device, that communicates with the Fortinet Security Fabric to provide information, visibility, and control to that device. It also enables secure, remote connectivity to the Security Fabric.
The FortiClient Fabric Agent can:
FortiClient is offered with several levels of capabilities, with increasing levels of protection. It integrates with many key components of the Fortinet Security Fabric and is centrally managed by the Endpoint Management Server (EMS).
|Zero Trust Agent with Multi-factor Authentication (MFA)||The Zero Trust Agent supports ZTNA tunnels, single sign-on (SSO), and device posture check to FortiOS access proxy|
|Central Management via EMS or FortiClient Cloud||Centralized FortiClient deployment and provisioning that allows administrators to remotely deploy endpoint software and perform controlled upgrades. Makes deploying FortiClient configuration to thousands of clients an effortless task with the click of a button.
Vulnerability dashboard helps manage an organization’s attack surface. All vulnerable endpoints are easily identified for administrative action.
Windows AD integration helps sync an organization’s AD structure into EMS so the same organization units (OUs) can be used for endpoint management. Realtime Endpoint Status always provides current information on endpoint activity and security events.
|Central Logging and Reporting||Centralized logging simplifies compliance reporting and security analysis by ForiSIEM or other SIEM product|
|Dynamic Security Fabric Connector||EMS creates virtual groups based on endpoint security posture. These virtual groups are then retrieved by FortiGate and used in firewall policy for dynamic access control. Dynamic groups help automate and simplify compliance for security policies.|
|Vulnerability Agent and Remediation||Vulnerability agent and remediation ensures endpoint hygiene and hardens endpoints to reduce the attack surface. This identifies vulnerable endpoints and prioritizes unpatched OS and software vulnerabilities with flexible patching options including auto-patching.|
|SSL VPN with MFA||Secure Socket Layer (SSL) Virtual Private Network (VPN) with MFA enables an easy-to-use encrypted tunnel that will traverse most any infrastructure.|
|IPsec VPN with MFA||IP Secure (IPSec) VPN with MFA enables an easy-to-use encrypted tunnel that provides the highest VPN throughput.|
|FortiGuard Web Filtering||
Powered by FortiGuard Labs research, the web filtering function monitors all web browser activities to enforce web security and acceptable usage policy with 75+ categories. It works across all supported operating systems and works with Google SafeSearch. The endpoint web filtering profile can be synchronized from FortiGate for consistent policy enforcement. Administrators can set black/white lists, on-/off-net policies, and import FortiGate web filtering policies for consistent enforcement.
FortiClient now supports a web filter plugin that improves detection and enforcement of web filter rules on HTTPS sites with encrypted traffic.
|USB Device Control||This capability prevents unauthorized USB devices from accessing the host.|
|Split-tunneling||Supported on ZTNA and VPN tunnels, split-tunneling enables optimized user experience|
|Single Sign-on (SSO)||SSO integrates with FortiAuthenticator identity and access management to provide single sign-on.|
|ZTNA Edition Features||This edition includes all the features in the ZTNA Edition plus the following:|
|AI-powered Next-Generation Antivirus (NGAV)||Anti-malware leverages FortiGuard Content Pattern Recognition Language (CPRL), machine learning, and AI to protect endpoints against malware. The pattern-based CPRL is highly effective in detecting and blocking polymorphic malware. It also blocks attack channels and malicious websites.|
|FortiClient Cloud Sandbox||FortiClient natively integrates with FortiSandbox. FortiClient automatically submits files to the connected FortiSandbox for real-time analysis. Sandbox analysis results are automatically synchronized with EMS. Administrators can see detailed information and behavior activities of submitted objects including graphic visualization of the full process tree.|
|Automated Endpoint Quarantine||When triggered by security events, automated endpoint quarantine automates policy-based response. For example, it can automatically quarantine a suspicious or compromised endpoint to contain incidents and prevent outbreaks.|
|Application Firewall||The application firewall provides the ability to monitor, allow, or block application traffic by categories. It uses the same categories as FortiGate, enabling consistent application traffic control. It leverages FortiGuard anti-botnet, IPS, and application control intelligence and can prevent the use of unwanted applications including proxy apps and HTTPS messaging apps.|
Application inventory provides visibility of installed software. In addition to managing licenses, software inventory can improve security hygiene. When software installed is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise.
Administrators can reduce the attack surface by leveraging inventory information to detect and remove unnecessary or outdated applications that are potentially vulnerable.
Schools continue to enhance their technologies in the curriculum and the adoption of personal devices such as Chromebooks are increasingly commonplace. School districts are required to be in compliance with Children’s Internet Protection Act (CIPA) and protect students from harmful content while browsing the internet.
Powered by FortiGuard Labs research, the web filtering function monitors all web browser activities to enforce web security and acceptable usage policy with 75+ categories. It also supports Google SafeSearch.
Read the solution brief
|Zero Trust Security|
|Compliance Enforcement Using Dynamic Access Control||✔||✔||✔||✔||✔|
|Endpoint Audit and Remedication with Vulnerability Scanning||✔||✔||✔|
|Remote Logging and Reporting||✔||✔||✔||✔||✔|
|ZTNA Remote Access||✔||✔||✔|
|Windows AD SSO Agent||✔||✔|
|USB Device Control||✔||✔||✔|
|Cloud-based Threat Detection||✔||✔|
|Automated Endpoint Quarantine||✔||✔|
|Zero Trust Agent|
|Zero Trust Network Access (ZTNA)||✔||✔||✔|
|Central Management using FortiClient Cloud||✔||✔||✔|
|Central Logging and Reporting||✔||✔||✔|
|SSL VPN with MFA*||✔||✔||✔|
|IPsec VPN with MFA*||✔||✔||✔|
|SSO Mobillity Agent||✔||✔||✔|
|Vulnerability Agent and Remediation||✔||✔||✔|
|FortiGuard Web Filtering||✔||✔||✔|
|USB Device Control||✔||✔||✔|
|Endpoint Security (EPP)|
|FortiSandbox (On Premise or PaaS)||✔||✔||✔|
|FortiClient Cloud Sandbox||✔||✔|
|Automated Endpoint Quarantine||✔||✔|
|Managed FortiClient Service|
|Security Fabric Setup/ Integration||✔|
|Endpoint Security Monitoring||✔|
|Best Practice Service (BPS) Consultation||Account Add-on||Account Add-on||N/A|
|On-Premise/ Air Gap Option||✔||✔|
FortiClient is more than endpoint protection. It strengthens enterprises overall security by integrating endpoints with network security and delivering continuous visibility and risk assessment of the endpoints. It supports proactive defense with vulnerability scanning, patching, compliance control and secure remote access.
Many enterprise customers realize the power and effectiveness of FortiClient and have provided positive feedback on Gartner Peer Insights. Read what end users say about our FortiClient Security Fabric Agent.
Senior Consultant IT in the Manufacturing Industry
“This is a solid all-in-one security product that we use to protect our corporate endpoints. The reason for our investment in this product was that we were looking for enhanced security features such as application control and web-filter for our Internet connected endpoints. Since we already had invested a lot in other Fortinet security products, we decided to also implement the FortiClient Endpoint Protection features and that is a decision we do not regret. With FortiClient we got a lot more than just the security features we needed. One of the greatest values was the ease of management and overview of our endpoints. This includes the vulnerability scanner and software inventory that comes with the latest version, which provides us with an overall threat summary of vulnerabilities on our endpoints.”
Cyber Security Leader in the Manufacturing Industry
“Fortinet is extremely easy to work with and their support is excellent. The integration of FortiClient with the overall Fortinet ecosystem is a large advantage for us.”
IT Manager in the Healthcare Industry
“FortiClient brings better endpoint visibility and total control. It knows endpoint vulnerability and only grants endpoint that has minimum requirement.”
Networks & Infrastructure Manager in the Construction Industry
“We deployed FortiClient to replace multiple products from other vendors. It combines multiple functions, VPN, AV, Application Firewall, Web Filtering [additionally, it integrates with] our Security Fabric, Telemetry & Compliance enforcement.”
IT Services Manager in the Education Industry
"A huge bonus is the compliance feature which will scan all programs installed on the endpoint and report back on whether that particular version of the program has vulnerabilities.”
IT Support in the Transportation Industry
“It is a very good product and the best thing is that it is integrated into a solution with both the [endpoint and] firewall, generating greater security of our workstations.”
For more Peer Insight reviews on FortiClient, click here.
Effective security and smooth operations are mission-critical for every organization. We fortify our products with best-in-class security services, professional services, and support.
The Best Practices Service is an account-based service that delivers guidance on deployment, upgrades, and operations. Fortinet experts help customers properly operate FortiClient installations. The BPS team will provide advice over the phone or email, but will not log into any customer systems nor directly configure or manage product.
FortiClient Managed services streamline the configuration, deployment, and ongoing monitoring of FortiClient agents managed by FortiClient Cloud. The MS team will log into a customer’s FortiClient Cloud account and can directly configure, observe, and monitor products deployed. MS is a device-based subscription service staffed by Fortinet professional engineers. Our extensive experience with FortiClient deployments effectively enables organizations to hire a team of endpoint specialists.
FortiGuard Labs delivers timely, global intelligence combined with fast decision-making and response across all critical vectors. This enables near-real time, AI-driven protection across the Fortinet Security Fabric.
FortiCare provides 24x7 support options to help keep your Fortinet deployment up and running smoothly. We also have services such as our Premium RMA options with 4-hour replacements, to make sure you’re covered in case of an extreme event.
FortiClient provides integration with many leading IT vendors as part of the Fortinet Security Fabric. Below is a list of current FortiClient Alliance Partners:
D3 Security's award-winning SOAR platform seamlessly combines security orchestration, automation and response with enterprise-grade investigation/case management, trend reporting and analytics. With D3's adaptable playbooks and scalable architecture, security teams can automate SOC use-cases to reduce MTTR by over 95%, and manage the full lifecycle of any incident or investigation.
Gradient Cyber® provides Security Operations as a Service (SOCaaS) combining our security operations platform and cyber analyst team delivering 24/7 threat detection and incident response. Together with Fortinet, we extend visibility, threat detection, and proactive response across on-premise network, endpoints, cloud services, and SaaS applications for even the most sophisticated attacks.
Infoblox is leading the way to next-level DDI with its Secure Cloud-Managed Network Services. Infoblox brings next-level security, reliability and automation to cloud and hybrid systems, setting customers on a path to a single pane of glass for network management. Infoblox is a recognized leader with 50 percent market share comprised of 8,000 customers, including 350 of the Fortune 500.
Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations. Together with Fortinet, Keysight enables visibility, security, and validation for Zero Trust environments.
SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention and remediation of threats initiated by nation states, terrorists, and organized crime. SentinelOne’s unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviors, protecting devices against advanced, targeted threats in real time.
Symantec Corporation (NASDAQ:SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. The partnership with Fortinet combines Symantec’s endpoint protection leadership with Fortinet’s best-in-class network security and Fabric integration to deliver unparalleled security protection.
Wandera’s mobile security suite provides multi-level protection against cyber threats for users, endpoints, and corporate applications. Customers taking advantage of the technical alliance between Fortinet and Wandera can enforce policies that are consistent on both sides of the perimeter.
Securing your endpoints against today’s threats on a myriad of devices can be quite a challenge for a number of reasons. Managing separate endpoint features is complex and time-consuming. Disparate security products don’t share intelligence, resulting in slow threat response. And, lack of IT expertise to effectively administer endpoint security can let threats into your network. FortiClient delivers easy-to-manage, automated, fully customizable endpoint security for a broad set of devices, removing those challenges.
FortiClient is more than just an advanced endpoint protection solution with a built-in VPN client. It connects the endpoint with the Security Fabric and delivers integrated endpoint and network security. With the modular design, users can deploy FortiClient for some or all of the use cases.
FortiClient ensures endpoint visibility and compliance throughout the Security Fabric and integrates endpoint and network security with automation and segmentation. FortiClient shares endpoint telemetry with the Security Fabric, enabling unified endpoint awareness.
In addition, it is also compatible with third-party anti-malware or endpoint detection and response (EDR) solutions.
Ensure secure remote access with always-on, SSL/IPsec VPN that supports network segmentation, conditional admission, and integrates with FortiAuthenticator for single sign on, and multi-factor authentication.
ZTNA Application Access
99% of the vulnerabilities exploited continue to be ones known by security and IT at the time of the incident. FortiClient enables vulnerability scanning with automated patching, software inventory, and application firewall to help reduce the attack surface and boost overall security hygiene.
As part of the telemetry shared throughout the Security Fabric, endpoint vulnerability information allows network security operations teams to take additional measures, such as dynamic access control, to help secure the environment.
The FortiClient vulnerability dashboard delivers detailed information including category, severity, and can pinpoint the affected endpoints.
Secure endpoints with machine learning antimalware and behavioral-based anti-exploit. Sandbox integrations detect advanced threats, customer malware, and script-based, file-less attacks. Application firewall, intrusion prevention system (IPS), botnet protection, and web content filtering provides additional layers of protection.
FortiClient also natively integrates with FortiSandbox. It can block the execution of any never-before seen file and automatically submit them to the sandbox for real-time analysis. Real-time threat intelligence from FortiSandbox is instantly shared across the enterprise to all endpoints.
The FortiClient endpoint management console shows detailed analysis from FortiSandbox.
See the product datasheet for more information.
FortiClient can be purchased with three levels of capability: Zero Trust Security, Endpoint Security, and Cloud-based Endpoint Security.
See the Models & Specs tab for details.