Introduction to FortiNAC
Gain visibility, control, and automated response across your wired and wireless network using network access control.
Watch NowProtect Your Digital Assets and Devices with FortiNAC
Free Product DemoFortiNAC is a zero-trust access solution that oversees and protects all digital assets connected to the enterprise network, covering devices from IT, IoT, OT/ICS to IoMT.
FortiNAC is Fortinet’s network access control solution that enhances the Fortinet Security Fabric with visibility, control, and automated response for everything that connects to the network. FortiNAC provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic response to a wide range of networking events.
For over 20 years, FortiNAC has been safeguarding organizations in the digital transformation journey by protecting ever-growing networks and digital assets. With continued technology advancement and innovations, FortiNAC expands its protection for today’s dynamic and ever-growing attack surface. It does this through real-time visibility, streamlined enforcement, dynamic policy adjustment, and automated response to compromised devices or anomalous activity.
Integrating with FortiGate and other Fortinet Security Fabric, FortiNAC gains a more comprehensive and accurate view of connected devices and users. Expanding its capability with true multi-vendor environment, FortiNAC can leverage existing infrastructure and orchestrate network segmentation and automated response.
Gain visibility, control, and automated response across your wired and wireless network using network access control.
Watch NowThe FortiNAC product line includes hardware appliances, virtual machines and licenses. The licenses can run on either the hardware appliance or the virtual machine. Each FortiNAC deployment requires both a Control and Application server. Note that if your deployment is larger than what a single server can support, you can stack servers for more capacity. The FortiNAC solution has no upper limit on the number of concurrent ports it can support.
View by:
Functionality |
Control and Application Server |
Capacity |
Each server manages up to 2,000 ports in the network |
Functionality |
Control and Application Server |
Capacity |
Each server manages up to 15,000 ports in the network |
Functionality |
Control and Application Server |
Capacity |
Each server manages up to 25,000 ports in the network |
Functionality |
Management Server |
Capacity |
Unlimited |
Functionality |
FortiNAC Control and Application next-gen VM Server (VMware/Hyper-V/AWS/Azure/KVM) |
Functionality |
FortiNAC Manager next-gen VM Server (VMware or Hyper-V) |
Functionality |
FortiNAC Control and Application VM Server (VMware/ Hyper-V/AWS/Azure/KVM) |
Functionality |
FortiNAC Manager VM Server (VMware or Hyper-V) |
FortiNAC Base License | ||
---|---|---|
Functionality | Endpoint Visibility and Auto Provisioning | |
Perpetual Licenses (Concurrent endpoint devices per license) | ||
100 | LIC-FNAC-BASE-100 | |
1,000 | LIC-FNAC-BASE-1K | |
10,000 | LIC-FNAC-BASE-10K | |
50,000 | LIC-FNAC-BASE-50K | |
Subscription Licenses | ||
25 | FC1-10-FNAC1-215-01-DD | |
500 | FC2-10-FNAC1-215-01-DD | |
10,000 | FC3-10-FNAC1-215-01-DD |
FortiNAC Plus License | ||
---|---|---|
Functionality | Visibility and Control | |
Perpetual Licenses (Concurrent endpoint devices per license) | ||
100 | LIC-FNAC-PLUS-100 | |
1,000 | LIC-FNAC-PLUS-1K | |
10,000 | LIC-FNAC-PLUS-10K | |
50,000 | LIC-FNAC-PLUS-50K | |
Subscription Licenses | ||
25 | FC1-10-FNAC1-213-01-DD | |
500 | FC2-10-FNAC1-213-01-DD | |
10,000 | FC3-10-FNAC1-213-01-DD |
FortiNAC Pro License | ||
---|---|---|
Functionality | Visibility, Control and Response | |
Perpetual Licenses (Concurrent endpoint devices per license) | ||
100 | LIC-FNAC-PRO-100 | |
1,000 | LIC-FNAC-PRO-1K | |
10,000 | LIC-FNAC-PRO-10K | |
50,000 | LIC-FNAC-PRO-50K | |
Subscription Licenses | ||
25 | FC1-10-FNAC1-209-01-DD | |
500 | FC2-10-FNAC1-209-01-DD | |
10,000 | FC3-10-FNAC1-209-01-DD |
View by:
★★★★
“Fit Our Needs As A K-12 Organization That Wanted To Do BYOD Minus Issue With Registration”
Director of Media and Technology
Industry: Education
Role: CTO
Firm Size: <50M USD
“This solution fits our needs because it allows for network segmentation, filtering, and user management within the product. It also interoperates with our directory, our firewall, and our filtering solutions seamlessly."
★★★★★
“Implementation Was Smooth And Product Runs With Very Few Problems”
VP Networking
Industry: Finance
Role: Infrastructure and Operations
Firm Size:1B - 3B USD
“Our company has been using the FortiNAC product for around 6 years and it has been a good experience. We use it to manage around 13K devices across 3 data centers and 260+ locations.”
★★★★
“Solid NAC Solution... Some Room To Improve Interface And Support”
Sr Director, Network Operations
Industry: Miscellaneous
Role: Infrastructure and Operations
Firm Size: <50M USD
“Once we got the hang of managing it, it's really been a god-send having visibility of all devices connected across our entire network.”
★★★★★
“Flexible Product, Vendor Agnostic, A Great Value In Device Registration On The Network”.
LAN Admin
Industry: Education
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees
“Flexible product, can get very detailed as to what you want to check/analyze/scan or can be setup very simplistic for on-boarding purposes. Is vendor agnostic on the hardware side and implementation was very smooth. We have been using this product for 11 years.”
★★★★★
“Seemless With No Customer Impact”
CIO - CISO
Industry: Healthcare
Role: CIO
"The product is easy to use and understand and the support team helped whenever asked. The protection of the network cannot happen without Port security and this product does that and gives you visibility."
★★★★
“Solid Products, But Needs Persistent Agent For Chromebooks”
Network Administrator
Industry: Education
Role: System Integrator
Firm Size: Gov't/PS/ED <5,000 Employees
“The overall experience has been great.”
★★★★★
“Effective Tool That Works Well”
Lead Network Architect Engineer
Industry: Government
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees
“The Network Sentry - Network Access Control aka NAC, has been critical in the control of access to our environment. It has allowed us to keep those who don't belong out, it alerts on attempts, and allowed us to catch audit penetration attempts.”
Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences, and do not represent the views of Gartner or its affiliates.
View by:
FortiNAC has integrations with more than 150 vendors, enabling it to integrate with virtually every switch, wireless access point, and firewall in your network. The below companies are examples of Fortinet Fabric partners with integrations. For a complete list of vendors with integrations, please see the data sheet.
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.
Coupling CyberMDX detection and identification capabilities with Fortinet, healthcare organizations are equipped with unmatched IoMT & IoT asset visibility, classification and attack-prevention enforcement tools.
The Cynerio-Fortinet joint solution equips healthcare IT security teams with comprehensive security and remediation policies that ensure uninterrupted clinical services. Armed with detailed insights into medical device behavior, impact, and criticality, hospitals can enforce customized cybersecurity policy using ACLs, VLANs, NAC and firewalls.
Google Cloud Platform is a secure, dedicated public cloud computing service operated by Google which provides a range of infrastructure and application services that enable deployments in the cloud. Fortinet provides critical firewalling, advanced security and scalable BYOL protection for elastic compute, container, and machine-learning workloads in Google’s innovative public cloud.
Hewlett Packard Enterprise is an industry-leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, HPE's technology and services help customers around the world make IT more efficient, more productive, and more secure.
Intel invents at the boundaries of technology to make amazing experiences possible for business and society, and for every person on Earth. To learn more about Intel and our technologies, please visit: www.intel.com
Jamf automates Apple device deployment, management and security without impacting the end-user experience or requiring IT to touch the device. Jamf preserves the native and consistent Apple experience that people expect at work, while fulfilling the security and compliance requirements of the enterprise.
Lightspeed Systems has been serving schools since 1999. It’s our mission to protect students by providing IT with the tools it needs to succeed.
Together, Medigate and Fortinet deliver the deep clinical visibility and cybersecurity intelligence needed to accurately detect real-time threats in healthcare networks and automate effective policy enforcement to keep patient data and operations safe.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more.
Nozomi Networks is a leading provider of real-time visibility, advanced monitoring capabilities, and strong security for industrial control networks supporting critical infrastructure. Nozomi has been deployed in some of the largest industrial installations, providing some of the fastest return-on–investment in the industry.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution that delivers any application at any scale.
Ordr delivers comprehensive proactive protection for the hyper-connected enterprise. The Ordr Systems Control Engine utilizes sophisticated machine learning and artificial intelligence to provide complete visibility and exhaustive control over every class of connected device and system.
Siemens is a global powerhouse focusing on the areas of electrification, automation and digitalization.
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform.
View by:
The surge in deployment of IoT devices requires advanced network security. Specifically, network operators need to be able to identify every user and device that connects to the network and then grant or limit network access appropriately. Furthermore, the network needs constant supervision to ensure ongoing safe operation with automated responses to threats as they are detected. FortiNAC from Fortinet can provide those capabilities so that network operators can confidently know who and what is on their network. Come and see how FortiNAC can provide visibility, control, and response for your network.
Detect and identify headless devices as they connect to the network
Utilize up to 21 different ways to determine the identity of a device
Leverage the Fortinet Security Fabric for better visibility, segmentation enforcement, and policy adjustments
Narrowly restrict network access for identified devices to only necessary network assets
Interact with and configure network devices (switches, wireless access points, firewalls, clients) from more than 150 vendors
FortiNAC architecture enables effective scaling to multi-site locations and supporting millions of devices
Controlling network access is a journey. It can start with certain sets of devices, a certain part of the network, or a certain function. FortiNAC supports a broad set of use cases that enable zero trust.
With comprehensive and ongoing discovery of devices, FortiNAC provides consolidated visibility, classification, and security posture. It can also be used to monitor and manage all digital assets.
With granular and contextual device information, FortiNAC can set up rule-based security policy that leads to dynamic segmentation and microsegmentation of the network.
With guest and contractor management capabilities, FortiNAC can see and control all devices, making it a perfect solution for onboarding and managing BYOD.
With event triggers, security events can be identified and mapped to notifications. These are sent to an administrator, followed by access control actions and workflow execution to dynamically mitigate and control threats in your environment.
With orchestration, you can automatically control network access and respond with detailed workflows from endpoint-based visibility and real-time behaviors. With bi-directional integration, FortiNAC can also pass detailed information upstream.
With rule-based access policy, enable least-privileged access to network resources for connected devices and perform re-authentication, re-authorization, and ongoing monitoring.