Best Software for 2025 is now live!
Save to My Lists
Unclaimed
Unclaimed

FortiGuard Security Subscriptions Features

What are the features of FortiGuard Security Subscriptions?

Evaluation

  • Malware Probability Scores

Top Rated FortiGuard Security Subscriptions Alternatives

Filter for Features

Orchestration

Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

Not enough data

Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

Not enough data

Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

Not enough data

Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

Not enough data

Information

Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

Not enough data

Personalization

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data

Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

Not enough data

Sandbox

Sandbox

An environment isolated from a network where threats can be safely evaluated.

Not enough data

Evaluation

Malware Evaluation

Tools to test an object to see whether or not it qualifies as malware.

Not enough data

Automatic Submission

The ability for a system to evaluate objects and automatically submit them to the sandbox.

Not enough data

Automatic Evaluation

The ability for a system to evaluate objects within the sandbax and assign a malware probability score.

Not enough data

Malware Probability Scores

As reported in 10 FortiGuard Security Subscriptions reviews. The ability to assign objects a score based on their probability of being malware.
92%
(Based on 10 reviews)

Prevention

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access.

Not enough data

Firewall

Protects servers, data center infrastructure and information from a variety of attacks and malware threats.

Not enough data

Encryption

Provide some level of encryption of information, protecting sensitive data while it exists within the data center.

Not enough data

Security hardening

Facilitates system and network security by identifying and remediating vulnerabilities

Not enough data

Cloud Data Protection

Provides high quality and wide scope of in-cloud and offline data security capabilities.

Not enough data

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Administration

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Administration Console -

Provides a centralized console for administation tasks and unified control.

Not enough data

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Connected Device Security

Vulnerability Assessment

Performs risk and security gap assessments for connected assets.

Not enough data

Identity Lifecycle

Assists with authentication and authorization of connected assets.

Not enough data

Threat Protection

Provides general protection against device threats, such as firewall and antivirus tools.

Not enough data

Behavior Analysis

Monitors device behaviors to identify abnormal events.

Not enough data

Incident Response

Responds to suspicious activity related to IoT devices. This may include actions such as threat containment and eradication as well as device recovery.

Not enough data

IoT Network Security

Provides security measures for IoT networks and gateways.

Not enough data

OTA Updates

Automatically sends over-the-air (OTA) security updates to connected devices.

Not enough data

Alerts & Notifications

Sends timely security notifications to users in-app or through email, text message or otherwise.

Not enough data

Platform

Dashboard

Has a centralized dashboard for users to interact with.

Not enough data

Hardware

Integrates with existing IoT hardware.

Not enough data

Performance

Is consistently available (uptime) and allows users to complete tasks reliably.

Not enough data

Reporting

Provides pre-built or customizable performance reports.

Not enough data