Fortinet FortiClient 5.0 for Windows v5.0.9
August 04, 2014
Starts at $1,000 for up to 2,000 clients, plus $1,998 for the FortiGate appliance.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Easy to deploy for any size organization. Delivers a number of layered defenses through an integrated offering.
- Weaknesses: Would like to see more visualization tools, i.e., reporting/dashboarding.
- Verdict: Great product for the investment.
The FortiNet Endpoint solution from Fortinet consisted of a FortiClient endpoint application and a FortiGate appliance used to manage the endpoints. FortiClient 5.0 runs as a client application on endpoint devices and it provides protection for anti-virus/anti-malware, web protection (web filtering), application firewall, secure remote access and vulnerability management.
The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits. There is also a cloud-based behavior scanning option to help detect unknown signature-type viruses. The web filtering module monitors web traffic based on URL category and blocks malicious websites according to the configured profile/policy. The application firewall recognizes the traffic generated by a large number of applications and can block application traffic based on configured rules/policy. The vulnerability management module scans the device and reports on known system vulnerabilities and patch gaps. Secure remote access is supported through both IPsec VPN and SSL VPN connections.
FortiClient is centrally managed from the FortiGate web management console, assuming that the clients are running in registered mode (with the FortiGate). The FortiGate administrator can enforce security policy on endpoints, deploy a preconfigured endpoint profile to connected devices, run a scheduled vulnerability scan, monitor device status and upload logs to a Fortinet centralized logging and reporting appliance. Centralized logging and reporting are handled through the FortiAnalyzer or FortiManager.
FortiClient can be installed on a standalone computer using the installation wizard or deployed to multiple Microsoft Windows systems using Microsoft Active Directory (AD) or the Microsoft System Center 2012 Configuration Manager (SCCM).
Installation was simple. We were provided a hosted appliance to use for our testing. However, full deployment would be very easy since the entire central management systems is appliance driven. The endpoint application is simple to deploy and configure. A new feature for this version is a pre-installation virus scan. This is integrated with the client-load process. There is support for Windows XP, Vista, Windows 7 and 8. Once the client is installed, there is a simple registration process to connect it to the management console.
Management of the endpoints is done through the web-based user interface. Client can be discovered or registered and then assigned to groups to associate with policies or profiles. Policies can also be assigned by Active Directory group as this information is automatically provided to the management console during the registration process. The user interface was simple to use and made setting up AV schedules, web filtering rules, blocked applications and VPN tunnels very easy. Centralized reporting is available via the management console. You get a lot of layered protection for an attractive per user price point.
There is a free online forum support available as well as several levels of premium and enhanced support.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure