Identity and Access Management (IAM) Products
Securely manage identity authentication & authorization policies to protect against security breaches.
FortiAuthenticator Product DemoSecurely manage identity authentication & authorization policies to protect against security breaches.
FortiAuthenticator Product DemoToday’s enterprise identity environments are made up of various systems of record ranging from networking devices, servers, directory services, and cloud applications. Managing an identity that resides in these various systems can quickly grow into such a large administrative challenge that it negatively affects users, administrators, and application developers.
Additionally, many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access. Securely and effectively managing identity authentication and authorization for all systems and applications is crucial to minimize security breaches.
導覽:
Hardware Appliances
Total Users |
500 |
說明 |
4x GE RJ45 ports, 1x 1 TB HDD |
Total Users |
2,000 |
說明 |
4x GE RJ45 ports, 2x 1 TB HDD |
Total Users |
10,000 |
說明 |
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB HDD |
Total Users |
20,000 |
說明 |
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive |
Total Users |
40,000 |
說明 |
4x GE RJ45 ports, 2x GE SFP, 2x 2 TB SAS Drive |
Please see the product page for more information on these and many more Product features.
Virtual Machines
使用者 |
100 |
說明 |
Base FortiAuthenticator-VM with 100 user license |
使用者 |
+100 |
說明 |
License to add 100 users to base VM |
使用者 |
+1000 |
說明 |
License to add 1000 users to base VM |
使用者 |
+10000 |
說明 |
License to add 10000 users to base VM |
使用者 |
+100000 |
說明 |
License to add 100000 users to base VM |
FortiToken
說明 |
Two factor authentication application for mobile devices |
說明 |
Standard multi-form factor OATH compliant hardware token |
說明 |
Hardware USB token for X.509 PKI certificates |
Please see the product page for more information on these and many more Product features.
FortiAuthenticator offers an Amazon Web Services (AWS) BYOL (bring your own license) option. Please see the AWS Marketplace listing for more information:
導覽:
★★★★★
“Strengthen Of Security, Easy And Quick Access”
Infrastructure Engineer
Industry: Services
Role: Infrastructure and Operations
Firm Size: <500M - 1B USD
“The experience was good to manage to do that with ease, fortiauthenticator SSO, and user management. The fortunate Enterprise also has a CA super of $xxM.”
★★★★★
“Easy MFA Tool”
Sr. System Administrator
Industry: Services
Role: Applications
Firm Size:1B - 3B USD
“Its a very handy tool for multi factor. easy to install and easy to configure. integration with FortiGate appliance also very easy. after deploying fortitoken we have control over unknows users to login through VPN.”
★★★★★
“Strengthen Your Security”
Team Lead IT Infrastructure
Industry: Manufacturing
Role: Infrastructure and Operations
Firm Size: 50M - 250M USD
“Good price value and easy to implement into existing environment. Easy to use for end users. Help us to achieve our aims.”
★★★★★
“Multifactor Authentication For FortiGate Devices”
Head Of Engineering - Security System
Industry: Construction
Role: Infrastructure and Operations
"We are using Forti Authenticator for secure access of FortiGate devices. this is very good tool for the secure access. performance is also very good and it works stand alone and can be integrated with active directory. We can have control over user access and we can get the report through event and logs. it can work with all FortiGate enterprise firewall and support all Android and IOS platform."
★★★★★
“Good Solution For MFA And/Or SSO When In A Fortinet Environment”
Network And Security Manager
Industry: Communications
Role: Infrastructure and Operations
Firm Size: 50M - 250M USD
“We achieve to configure it easily with other Fortinet solution. The integration with "SAML compatible" on premise or cloud solutions is pretty easy. The main problem is when you want to integrate it with existing non radius or saml solutions.”
★★★★★
“All In One Authenticator For Forti Products”
Network And Security Engineer
Industry:Services
Role: Security and Risk Management
Firm Size: 250M - 500M USD.
“The overall experience is very satisfying. It comes with both VM and appliance but we purchase appliance. There app size is small, it supports both IOS and Android. Also we are using authenticator for almost all fortigate firewall logins and on forticlient as well which help us to enhance security. It also integrates with AD and also have different mode of authentication.”
★★★★★
“Good User Identity(2FA) Management Tool”
Product
Industry: Finance
Role: Product Management/Marketing
Firm Size: 250M-500M USD
“Fortitoken is very convenient for the 2FA and especially during the lockdown, the tool was very useful in accessing Office VPN at an ease."
FortiAuthenticator provides integration with many leading IT vendors as part of the Fortinet Security Fabric. Below is a list of current FortiAutheticator Alliance Partners:
As a business unit of Alibaba Group, Alibaba Cloud provides a comprehensive suite of global cloud computing services to power both our international customers’ online businesses and Alibaba Group’s own e-commerce ecosystem.
AWS services are trusted by more than a million active customers around the world – including the fastest growing startups, largest enterprises, and leading government agencies – to power their infrastructures, make them more agile, and lower costs.
Learn more on the Fortinet-AWS alliance
Guardicore solutions provide a simpler, faster way to guarantee persistent and consistent security — for any application, in any IT environment. Together with Fortinet Guardicore provides visibility and control for hybrid clouds and data centers.
METTCARE leads with a unified and secure digital identity engine, making edge-to-cloud computing impenetrable to intruders. Cybersecurity and privacy are built into the fabric of METTCARE and Fortinet digital transformation with device-IoT-user authentication, business intelligence and risk mitigation. Cyber-resilient organizations depend on METTCARE intelligent-data access, consented-data management and quantum-ready data storage.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution that delivers any application at any scale.
Okta, the leader in identity and access management, works with best of breed technology partners like Fortinet to enable seamless and secure Zero Trust access.
Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services.
Pulse Secure enables seamless access to resources by combining visibility, authentication and context-based access control. This solution with Fortinet extends perimeter protection to all devices visible to the Secure Access solution while allowing access controls to respond to threat intelligence gathered by the Fortinet platform.
Safe-T® is a provider of Zero Trust Access solutions that mitigate attacks on enterprises’ business-critical services while ensuring uninterrupted business continuity. Together with Fortinet, organizations deploy a best of breed Zero Trust Network Access solution, ensuring only authorized users have access to company resources.
SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention and remediation of threats initiated by nation states, terrorists, and organized crime. SentinelOne’s unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviors, protecting devices against advanced, targeted threats in real time.
Trellix brings you a living XDR architecture that adapts at the speed of threat actors and delivers advanced cyber threat Intelligence. Trellix and Fortinet's integrated solution secures distributed environments using the latest XDR tools to deliver faster detection and response time for optimum security outcomes.
The increase in cloud-based applications and connected devices have changed the way we work. This has also expanded the attack surface, giving cybercriminals more opportunities for targeted attacks. To avoid breaches, organizations need to ensure the right users are accessing the right network resources using cloud identity and access management (cloud IAM).
Fortinet User Authentication provides you with the tools and capabilities for effective authentication, access, and identity management of users, devices, and guests or partners. You can federate identity to provide a great experience for your users through Fortinet's IAM solution.
Flexible deployment options let you decide the best way to deploy the IAM solution, depending on your needs. Choose on-premises ready-to-use hardware, a virtual machine, managed cloud, or identity-as-a-service (IDaaS). Quickly integrate Fortinet IAM Products with existing authentication infrastructure such as active directory (AD) or LDAP, or with new services through cloud service providers.
Providing secure access to applications, services, or software development hosted on-premises or in the cloud, while offering ease of use for end users, is a constant challenge.
You can make it much tougher for hackers to gain access to protected information through the use of additional credentials such as a one-time passcode (OTP). OTP is one component of MFA. MFA is a crucial security feature of any IAM solution because it requires verification of multiple credentials:
Therefore, even if a cybercriminal has a username and password, they cannot access the system without the other information.
Fortinet MFA, which is a crucial security feature of any IAM solution, provides easy-to-use secure access to corporate VPNs, Wi-Fi, on-premises, or cloud-based apps. Users can quickly log on by responding to a push notification on their smart device during the authentication process.
學到更多Centrally managing user identities and their access to organizational resources is the most effective identity and access management (IAM) security practice. With the IAM centralized solution, IT admins can enforce password complexity requirements and multi-factor authentication. Plus, Fortinet IAM delivers a better user experience when accessing services and applications in the cloud or on-premises.
Single sign-on (SSO) technology is a key component of the IAM Product that enables users to securely authenticate with multiple applications and websites by logging in only once. However, not all SSO solutions are built equally. Some providers offer an SSO solution for web-based applications, while others leverage public cloud infrastructure. Still, other SSO solutions are designed for on-premises services including applications, file storage, servers, and networks. Solely adopting a web-based application SSO solution is inefficient for effective identity security because cloud infrastructure and on-premises services will have different SSO requirements. As a result, managing (and federating) identities will largely remain decentralized and would require integration efforts across different SSO solutions to provide true SSO capability.
Fortinet FortiAuthenticator provides a comprehensive approach to SSO with centralized identity management. It authenticates users with traditional on-premises as well as modern web and cloud authentication protocols. Organizations gain full control. You can securely connect your users to appropriate resources in the cloud or on premises while improving their experience.
學到更多Intuitive, centralized authentication and authorization services
Multi-factor authentication and management
Single sign-on (SSO) for web/cloud applications and network resources
Guest, BYOD, and certificate management
Simple deployment and licensing
Integration with secure directories
Fortinet IAM products provide the services necessary to securely confirm the identities of users and devices as they enter the network. With our robust identity access management solution, you can control and manage identity to securely allow the right users to only the appropriate resources.
The Fortinet IAM solution includes the following products:
The combination of FortiAuthenticator and FortiToken or FortiToken Cloud effectively addresses the identity and access management challenges organizations face in this era of rapidly increasing user and device connectivity.
5/09/2018: FortiAuthenticator Release Notes: FortiAuthenticator announces the availability of it latest software release 5.3. Offering improvements to guest and web portal services along with feature enhancements 5.3 cements FortiAuthenticators position as the gatekeeper of the Fortinet Security Fabric.