Fortinet, Inc | Fortinet FortiManager (BYOL) Centralized Security Management
Introduction of Fortinet, Inc

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide.

Fortinet FortiManager (BYOL) Centralized Security Management
Reduce costs, simplify configuration, automate provisioning & maintain compliance with FortiManager - Offers centralized configuration, policy-based provisioning, update management and end-to-end network monitoring for your Fortinet installation - You can further simplify management of your network security by grouping devices into geographic or functional administrative domains (ADOMs) - Easily manage VPN policy and configuration while leveraging FortiManager virtual appliances as a local distribution point for software and policy updates

Fortinet FortiManager lets you maintain control over your FortiGate and FortiAP topologies through an easy-to-use, centralized, single-pane-of-glass management console. Easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices. FortiManager provides crucial timesaving features like device auto-discovery, group management, global policies, auditing facilities, and the ability to manage complex VPN environments.

FortiManager delivers:

  • East of management over hundreds to thousands of FortiGate appliances with consistency 
  • Basic FortiAnalyzer logging and reporting for tighter correlation of events and policies
  • Hierarchical objects database to facilitate re-use of common configurations across the organization
  • Role-based administration to enable distributed management
  • Policy auditing per device for regulatory compliance and track any deviations from the required security policy
CLICK HERE to view the detailed user guide for more information. For more information about the product, please visit the Product Page.