FortiGuard Security Subscriptions Features
What are the features of FortiGuard Security Subscriptions?
Evaluation
- Malware Probability Scores
Top Rated FortiGuard Security Subscriptions Alternatives
(127)
4.6 out of 5
Visit Website
Sponsored
FortiGuard Security Subscriptions Categories on G2
Filter for Features
Orchestration
Asset Management | Lets users group and organize their endpoints to gather threat intelligence on specific technologies. | Not enough data | |
Security Workflow Automation | Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. | Not enough data | |
Deployment | The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. | Not enough data | |
Sandboxing | A feature that allows security testing and information gathering to occur in a secure, resource independent environment. | Not enough data |
Information
Proactive Alerts | Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Intelligence Reports | The ability for users to produce reports outlining detailed and personalized threat information | Not enough data |
Personalization
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Security Validation | The product has a recurring examination process to update your intelligence reports as new threats emerge. | Not enough data | |
Dynamic/Code Analysis | The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities. | Not enough data |
Sandbox
Sandbox | An environment isolated from a network where threats can be safely evaluated. | Not enough data |
Evaluation
Malware Evaluation | Tools to test an object to see whether or not it qualifies as malware. | Not enough data | |
Automatic Submission | The ability for a system to evaluate objects and automatically submit them to the sandbox. | Not enough data | |
Automatic Evaluation | The ability for a system to evaluate objects within the sandbax and assign a malware probability score. | Not enough data | |
Malware Probability Scores | As reported in 10 FortiGuard Security Subscriptions reviews. The ability to assign objects a score based on their probability of being malware. | 92% (Based on 10 reviews) |
Prevention
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Firewall | Protects servers, data center infrastructure and information from a variety of attacks and malware threats. | Not enough data | |
Encryption | Provide some level of encryption of information, protecting sensitive data while it exists within the data center. | Not enough data | |
Security hardening | Facilitates system and network security by identifying and remediating vulnerabilities | Not enough data | |
Cloud Data Protection | Provides high quality and wide scope of in-cloud and offline data security capabilities. | Not enough data |
Detection
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Anti-Malware / Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Administration
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Administration Console - | Provides a centralized console for administation tasks and unified control. | Not enough data | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Connected Device Security
Vulnerability Assessment | Performs risk and security gap assessments for connected assets. | Not enough data | |
Identity Lifecycle | Assists with authentication and authorization of connected assets. | Not enough data | |
Threat Protection | Provides general protection against device threats, such as firewall and antivirus tools. | Not enough data | |
Behavior Analysis | Monitors device behaviors to identify abnormal events. | Not enough data | |
Incident Response | Responds to suspicious activity related to IoT devices. This may include actions such as threat containment and eradication as well as device recovery. | Not enough data | |
IoT Network Security | Provides security measures for IoT networks and gateways. | Not enough data | |
OTA Updates | Automatically sends over-the-air (OTA) security updates to connected devices. | Not enough data | |
Alerts & Notifications | Sends timely security notifications to users in-app or through email, text message or otherwise. | Not enough data |
Platform
Dashboard | Has a centralized dashboard for users to interact with. | Not enough data | |
Hardware | Integrates with existing IoT hardware. | Not enough data | |
Performance | Is consistently available (uptime) and allows users to complete tasks reliably. | Not enough data | |
Reporting | Provides pre-built or customizable performance reports. | Not enough data |