FortiSIEM
Powerful Security Information and Event Management (SIEM) with User and Entity Behavior Analytics (UEBA)
ESG Technical Validation 2018 – FortiSIEM
SIEM Overview
As digital transformation sweeps through every industry, the attack surface grows dramatically (and constantly), making security management increasingly difficult. Security teams struggle to keep up with the deluge of alerts and other information generated by their multitude of security devices. And the cybersecurity skills gap only makes this more difficult.
Infrastructure, applications, and endpoints (including IoT devices) must all be secured. This requires visibility of all devices and all the infrastructure—in real time. Organizations also need to know what devices represent a threat and where.
FortiSIEM Delivers Next-Generation SIEM Capabilities
FortiSIEM brings together visibility, correlation, automated response, and remediation in a single, scalable solution. It reduces the complexity of managing network and security operations to effectively free resources, improve breach detection, and even prevent breaches.
What’s more is that our architecture enables unified data collection and analytics from diverse information sources including logs, performance metrics, security alerts, and configuration changes. FortiSIEM combines the analytics traditionally monitored in separate silos of the security operations center (SOC) and network operations center (NOC) for a more holistic view of the security and availability of the business.
In addition, FortiSIEM UEBA leverages machine learning and statistical methodologies to baseline normal behavior and incorporate real-time, actionable insights into anomalous user behavior regarding business-critical data. By combining telemetry that is pulled from endpoint sensors, network device flows, server and applications logs, and cloud APIs, FortiSIEM is able to build comprehensive profiles of users, peer groups, endpoints, applications, files, and networks. FortiSIEM UEBA behavioral anomaly detection is a low-overhead but high-fidelity way to gain visibility of end-to-end activity, from endpoints, to on-premises servers and network activity, to cloud applications.
Related Resources
Learn more about our FortiSIEM
Key FortiSIEM Advantages
An advanced SIEM solution will do more than just aggregate security events. FortiSIEM offers leading threat protection and high business value. Key benefits include:

Scale-as-you-grow architecture and licensing
Rapid scalability is inherent in FortiSIEM’s virtual machine (VM) architecture* and licensing options.
- Easily increase performance and log-processing capacity by adding VMs.
- No extra charge for adding VMs.
- Flexible licensing options include MSSP PAYG, subscription, and perpetual.

Unified platform
Reduce complexity with multi-tenancy and multi-vendor support.
- Multi-tenancy is supported on a single platform. MSSPs are able to centrally manage all customers while maintaining overall visibility. FortiSIEM supports this with:
- A customizable, multi-tenant-capable graphical user interface (GUI)
- A multi-tenant-capable database
- Scalable, multi-tenant-capable architecture.
- FortiSIEM supports hundreds of multi-vendor products out-of-the-box and seamless integration with Fortinet products.

Single-pane-of-glass management and control
Most FortiSIEM features including dashboards, analytics, incidents, configuration management database (CMBD), and administration are accessed via an intuitive, web-based GUI.
- Customizable role-based access control lets organizations determine what each user can access.
- Active asset discovery assists with building out an integrated CMBD for better asset management.
- Performance and availability monitoring, such as CPU, memory, storage, and configuration changes extend the functionality of the platform and deliver additional contextual data.

Better incident detection with reduced incident impact
FortiSIEM identifies external and internal threats faster. Plus, it enables threat hunting and compliance monitoring.
- Incident detection time is reduced with a patented and distributed correlation engine to detect incidents.
- Out-the-box content includes pre-designed parsers, dashboards, and reporting to cover the most commonly found devices, delivering quick value
- FortiSIEM Analytics helps hunt for threats and indicators of compromise (IOC).
- Insider threats are identified with FortiSIEM UEBA, using an agent on endpoints to collect telemetry on behavior.
- Overall, the mean time to respond (MTTR) is reduced

Out of the Box Compliance and Return on investment (ROI)
Higher ROI is obtained with improved efficiency, lowered risk and reduced impact of attacks, and simplified compliance.
- Staff and analyst efficiency are improved because they receive the right information and detection.
- Risks are managed with incident detection and reporting.
- FortiSIEM out-of-the-box Compliance Reports help organizations stay compliant.
- Pre-defined content reduces time to value. There are over 750 rules, about 3,000 reports, pre-defined dashboards, and more than 200 vendor devices supported.
- Security teams can understand incident impact by defining business services. This should indicate what business service is affected by an incident.
FortiSIEM News
-
Oct 22, 2020Leveraging FortiSIEM 6.1 with UEBA Analytics to Monitor Remote Endpoints
-
Oct 13, 2020FortiSIEM 5.4 Release Notes
-
Sep 9, 2020FortiSIEM 6.1 Release Notes
-
Apr 2, 2020SC Magazine Labs Awards FortiSIEM 5/5 Stars!FortiSIEM is an ideal SIEM solution for MSSPs and those looking for high usability in a scalable architecture with robust out-of-the-box content
-
Jan 13, 2020SC Magazine has named Fortinet a 2019 Industry Innovator for FortiSIEMIn recognition of the technical innovation found in the FortiSIEM solution and their expectation for FortiSIEM success in the Security Infrastructure marketspace, SC Media has recognized Fortinet as a 2019 Industry Innovator in their annual SC Media Innovators report
FortiSIEM Videos
Building a Cybersecurity Workforce
Advanced training for security professionals, technical training for IT professionals, and awareness training for teleworkers.
Learn MoreFortiSIEM Models and Specifications
Events per Second |
5,000 |
Storage Capacity |
3 TB |
Events per Second |
15,000 |
Storage Capacity |
36 TB |
Events per Second |
30,000 |
Storage Capacity |
72 TB |
FortiSIEM virtual machines are supported on VMware vSphere, KVM, Microsoft Hyper-V and OpenStack
Description |
50 devices and 500 EPS all-in-one perpetual license |
Description |
Add 25 devices and 250 EPS all-in-one perpetual license |
Description |
Add 50 devices and 500 EPS all-in-one perpetual license |
Description |
Add 100 devices and 1000 EPS all-in-one perpetual license |
Description |
Add 250 devices and 2500 EPS all-in-one perpetual license |
Description |
Add 450 devices and 4500 EPS all-in-one perpetual license |
Description |
Add 950 devices and 9500 EPS all-in-one perpetual license |
Description |
Add 1950 devices and 19500 EPS all-in-one perpetual license |
Description |
Add 3950 devices and 39500 EPS all-in-one perpetual license |
Description |
Add 4950 devices and 49500 EPS all-in-one perpetual license |
FortiSIEM virtual machines are available on Amazon Web Services.
Product Demo
Learn how FortiSIEM monitoring tools can help you detect, prevent, and respond to security threats by doing a self-guided demo.
Please complete the form below to request a FortiSIEM demo:
FortiSIEM Alliance Partners
FortiSIEM provides integration with many leading IT vendors as part of the Fortinet Security Fabric. Below is a list of current FortiSIEM Alliance Partners:

AWS services are trusted by more than a million active customers around the world – including the fastest growing startups, largest enterprises, and leading government agencies – to power their infrastructures, make them more agile, and lower costs.
Learn more on the Fortinet-AWS alliance

Anomali delivers high-fidelity threat intelligence from diverse sources to Fortinet, providing the contextualized threat intelligence and triggers necessary to prioritize and initiate an incident response, and when paired with event data, allowing your SOC analysts to focus on the real threats, rather than false positives.

ATAR Labs builds next-generation SOAR platform ATAR. Together with Fortinet, SOC teams become more agile and respond to complex threats and defend their infrastructure. Automatic processes deployed and orchestrated from ATAR, and enforcement, and detection from Fortinet creates an integrated operation to achieve a secure environment.

Bambenek Labs' threat intelligence solution surveil's cybercrime networks in real-time to provide actionable, relevant, and high-fidelity threat intelligence to block threats at the network layer. Together, with Fortinet, you can enrich your network devices and SIEM with high fidelity threat intelligence to provide enhanced protection for your organizations to prevent breaches.

Brocade networking solutions help the world's leading organizations turn their networks into platforms for business innovation. With solutions spanning public and private data centers to the wireless network edge, Brocade is leading the industry in its transition to the New IP network infrastructures required for today's era of digital business.

Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.

CyberArk is the global leader in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline. CyberArk delivers the industry’s most complete solution to reduce risk created by privileged credentials and secrets.

CyberX delivers the only IIoT and ICS cybersecurity platform built by blue-team experts with a track record defending critical national infrastructure-and the only platform with patented ICS-aware threat analytics and machine learning. Together with Fortinet, CyberX reduces the time from ICS & IIoT threat detection to prevention.

CyGlass is an AI based SaaS security platform that uses network data to uncover, pinpoint, and respond to advanced cyber threats that have evaded traditional security controls.

D3 Security's award-winning SOAR platform seamlessly combines security orchestration, automation and response with enterprise-grade investigation/case management, trend reporting and analytics. With D3's adaptable playbooks and scalable architecture, security teams can automate SOC use-cases to reduce MTTR by over 95%, and manage the full lifecycle of any incident or investigation.

DFLabs IncMan SOAR leverages existing security products to dramatically reduce the response and remediation gap caused by limited resources and the increasing volume of incidents. Together with Fortinet, IncMan allows joint customers to respond to security incidents in a faster, more informed and efficient manner.

The Dragos mission is to safeguard civilization from those trying to disrupt the industrial infrastructure. Dragos provides solutions for asset identification, threat detection, and response with insights from industrial control systems (ICS) cybersecurity experts. Dragos works with Fortinet to provide increased visibility and improved correlation of cyber events. This helps customers evaluate and make better informed decisions when classifying events and required actions.

Enable strong authentication for your Fortinet VPN and SIEM solutions with Entrust Datacard Identity. With cloud or on-premises deployment options, Entrust Datacard’s authentication solution integrates with Fortinet FortiGate VPN and FortiSIEM Server Agent using industry-standard protocols (Radius or SAML).

Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through high-performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. Flowmon complements Fortinet with network behavior analysis on east-west traffic while the integration with Fortinet keeps our mutual customers safe from advanced security threats.

Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security, and superior performance.

IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio enables organizations to effectively manage risk and defend against emerging threats.
- Fortinet – IBM Security AppScan Solution Brief
- Fortinet – IBM Security QRadar Solution Brief
- Fortinet FortiGate and IBM QRadar Deployment Guide
- FortiGate App For IBM QRadar Technical Solution Guide
- Fortinet - IBM Resilient Technical Deployment Guide
- Fortinet - IBM Cloud Connector Solution Brief
- Fortinet FortiSOAR Connector for IBM QRadar

Infoblox is leading the way to next-level DDI with its Secure Cloud-Managed Network Services. Infoblox brings next-level security, reliability and automation to cloud and hybrid systems, setting customers on a path to a single pane of glass for network management. Infoblox is a recognized leader with 50 percent market share comprised of 8,000 customers, including 350 of the Fortune 500.

Revolutionizing cybersecurity with the first of its kind enterprise threat intelligence and mitigation platform that drives proactive defense by turning tailored threat intelligence into automated security action.

Ixia delivers a powerful combination of innovative solutions and trusted insight to support your network and security products, from concept to operation.

LinkShadow Cybersecurity Analytics Platform is a world-leading UEBA and Threat-Hunting Solution Provider. Together with Fortinet, LinkShadow can empower the Security team with cutting-edge Threat Anticipation with Proactive Incident Response, while simultaneously gaining rapid insight into the effectiveness of the existing security investments.

Micro Focus is a global software company with 40 years of experience in delivering and supporting enterprise software solutions that help customers innovate faster with lower risk. Our portfolio enables our 20,000 customers to build, operate and secure the applications and IT systems that meet the challenges of change. We are a global software company, committed to enabling customers to both embrace the latest technologies and maximize the value of their IT investments. Everything we do is based on a simple idea: the fastest way to get results from new technology investments is to build on what you have–in essence, bridging the old and the new.
- Fortinet-Micro Focus Fortify WebInspect Solution Brief
- Fortinet-Micro Focus ArcSight ESM Solution brief
- ArcSight Marketplace

Nozomi Networks is a leading provider of real-time visibility, advanced monitoring capabilities, and strong security for industrial control networks supporting critical infrastructure. Nozomi has been deployed in some of the largest industrial installations, providing some of the fastest return-on–investment in the industry.
- Solution brief
- Fortinet FortiGate and Nozomi Networks Guardian Deployment Guide
- Fortinet FortiSIEM and Nozomi Networks CMDB Deployment Guide
- ICS Security Overview & Integration Video
- Fortinet-Nozomi integration demo

Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services.

RAM2 - OTORIO's Industrial-SOAR platform, designed for automation personnel operations and collaboration with the SOC's cyber experts. RAM2 offers centralized, simplified and automated industrial cyber risk preparedness and management solution. Based on attack vectors simulations and business impact risk engine the RAM2 provides smart mitigations to the operational environment and manufacturing processes.

Network security is about trust. Trust in the assurance, expertise, and guidance to understand your requirements, identify the right solution, and support you from start to finish. Owl hardware-enforced cybersecurity and professional services, with Fortinet’s network and cloud security software, create a trusted, hardened barrier for your digital assets.

PowerDMARC is an email authentication security platform that leverages protocols like DMARC, MTA-STS, and BIMI to help organizations combat domain spoofing, secure their email channel and enhance their brand’s reputation. Together with Fortinet, they aspire to make email the safest way to communicate.

Pulse Secure enables seamless access to resources by combining visibility, authentication and context-based access control. This solution with Fortinet extends perimeter protection to all devices visible to the Secure Access solution while allowing access controls to respond to threat intelligence gathered by the Fortinet platform.

RAD is a global Telecom Access solutions and products vendor, at the forefront of pioneering technologies. For critical infrastructure, our Service Assured Networking solutions include best-of-breed products for cyber-secure industrial IoT (IIoT) backhaul with edge/fog computing and seamless migration to modern packet-switched OT WANs.

Rubrik delivers a single platform to manage and protect data in the cloud, at the edge, and on-premises. Enterprises choose Rubrik’s Cloud Data Management software to simplify backup and recovery, accelerate cloud adoption, and enable automation at scale.

Safetica Technologies delivers data protection solution for business. Safetica DLP (Data Loss Prevention) prevents companies from data breaches, teaches employees to care about sensitive data and makes data protection regulations easy to comply. Safetica integration with Fortinet technologies gives companies a powerful tool to secure all its´ data, no matter where it resides or flows.

SCADAfence provides threat protection, risk management and visibility solutions for industrial OT networks. Combining SCADAfence’s dedicated solutions for OT networks with Fortinet’s Security Fabric, allows industrial organizations to effectively enforce security policies, improve incident response and extend their visibility from IT to OT.

Seclytics uses Science to predict where attacks will originate - on average 51 days before they strike - with over 97% accuracy and <.01 false positives. Together with Fortinet, we are able to report on and prevent attacks before adversaries strike.

SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention and remediation of threats initiated by nation states, terrorists, and organized crime. SentinelOne’s unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviors, protecting devices against advanced, targeted threats in real time.

ServiceNow makes work better. Our applications automate, predict, digitize and optimize business processes across IT, Customer Service, Security Operations, HR and more, for a better enterprise experience.

Splunk Inc. is the market-leading platform that powers Operational Intelligence.

Swimlane is at the forefront of the growing market of security automation, orchestration and response (SOAR) solutions and was founded to deliver scalable and flexible security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages.

Symantec Corporation (NASDAQ:SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. The partnership with Fortinet combines Symantec’s endpoint protection leadership with Fortinet’s best-in-class network security and Fabric integration to deliver unparalleled security protection.
- Solution brief
- Technical Deployment Guide
- Press Release on partnership
- Fabric Connector Technical Guide

Tanium offers a proven platform for endpoint visibility and control that transforms how organizations manage and secure their computing devices with unparalleled speed and agility.

Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform.

Designed by analysts but built for the entire team, ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform.

Trend Micro, a leader in cloud, endpoint, and email security, has partnered with Fortinet to help our mutual customers detect and respond to attacks more effectively throughout their organizations.

TriagingX provides automation of endpoint forensics, cutting advanced threat hunting time from hours to minutes. TXHunter analyzes Fortinet firewall log data and automatically launches forensic investigation on alerted endpoints. TXHunter enables FortiSIEM users to investigate sophisticated threats without leaving the platform. It's fast, efficient, and effective.

Vectra AI is the leading Cloud & Network Detection and Response (NDR) for your network, cloud, datacenter and SaaS applications. The Vectra platform blends security research with data science. Together with Fortinet, Vectra will automatically find and stop advanced attacks before they cause damage.

VMware is a global leader in cloud infrastructure and business mobility.
- NSX solution brief
- NFV solution brief
- NSX-T solution brief
- Carbon Black Solution brief
- Carbon Black Technical Integration Guide
- Carbon Black Solution Video

WitFoo has partnered with Fortinet to provide better security visibility to our joint customers. WitFoo delivers a comprehensive cybersecurity operations platform that combines capabilities across SIEM, SOAR, IRP, UEBA, and NBAD. By leveraging Fortinet’s rich data sources, WitFoo and Fortinet provide visibility across the entire attack life cycle and automate threat mitigation capabilities.

Zentera’s CoIP™ (Cloud over IP) Platform creates a unified zero trust network to secure on-prem and cloud environments. The zero trust network contains and protects sensitive cross-domain applications, such as hybrid cloud and IT/OT environments, enabling application segmentation without changing existing network and security infrastructure.

Ziften simplifies endpoint protection.
The Zenith endpoint protection platform is a single product that stops cyber-attacks on all enterprise endpoints – laptops, desktops, servers, and cloud. The single agent deploys quickly and delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis. The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have. Together with Fortinet, Ziften leverages the Fortinet Security Fabric to help customers better secure their endpoints, servers, and network.