Identity and Access Management
Secure Network Authentication -- Gatekeeping the Security Fabric
Identity Access Management
Establishing identity through secure authentication is important for implementing an effective security policy. Many of today’s most damaging security breaches have been due to users being provided with inappropriate levels of access, or worse—compromised static passwords. At Fortinet, Identity Access Management is an underlying component of our Security Fabric, establishing identity at its entry point. FortiAuthenticator User Identity Management together with FortiToken deliver cost-effective, scalable, and secure access control to your entire network infrastructure.
Identity Access Management features include:
Intuitive, centralized authentication and authorization services that establish identity in the implementation of security policy
Single-Sign-On for both Web/cloud and network resources
Two-factor strong authentication and management
Guest, BYOD, and certificate management
Simple deployment and licensing
OATH compliant time-based one-time password (TOTP) tokens let you solve network authentication security problems affordably by adding a second factor for strong authentication.
Securing business communications, personal information, financial transactions, and mobile devices involves much more than network access control. It requires scanning for malware, preventing access to malicious websites, BYOD support, and controlling application usage. Fortinet provides access layer solutions that balance the need for security with the flexibility of allowing any device onto the network, plus an access technology portfolio that provides the most flexible security platform with end-to-end protection