Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated FortiIsolator Alternatives

FortiIsolator Reviews & Product Details

FortiIsolator Overview

FortiIsolator Details
Show LessShow More

Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
152,064 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
Total Revenue (USD mm)
$2,594
Description

Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey.

Recent FortiIsolator Reviews

Sumukha B.
SB
Sumukha B.Small-Business (50 or fewer emp.)
4.5 out of 5
"Great Browser Isolation Platform"
The best thing is its available in both Hardware based as well as Virtual Machine, which can be deployed to isolate and secure most critical target...
Verified User
C
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"Minimize the chances of client-side attacks on users"
The FortiIsolator adds a layer of security that no other tool can add, which is ensuring that all browsed content is executed on a temporary sandbo...
Owais K.
OK
Owais K.Mid-Market (51-1000 emp.)
4.0 out of 5
"Firewall that has capabilities beyond our thinking"
The user-friendly interface of the system is very significant. Also, the system's on-premises hardware gives customers more satisfaction. While the...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

FortiIsolator Media

Answer a few questions to help the FortiIsolator community
Have you used FortiIsolator before?
Yes

3 FortiIsolator Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 FortiIsolator Reviews
4.3 out of 5
3 FortiIsolator Reviews
4.3 out of 5
G2 reviews are authentic and verified.
Sumukha B.
SB
Electrical Engineer
Design
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about FortiIsolator?

The best thing is its available in both Hardware based as well as Virtual Machine, which can be deployed to isolate and secure most critical targets from malware especially the new rising zero-day attacks Review collected by and hosted on G2.com.

What do you dislike about FortiIsolator?

The only limitation i think is its VM deployment has limited virtual memory and storage capability Review collected by and hosted on G2.com.

What problems is FortiIsolator solving and how is that benefiting you?

Its helping us to isolate critical web applications from direct exposure to outside network Review collected by and hosted on G2.com.

Owais K.
OK
IT Application Developer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about FortiIsolator?

The user-friendly interface of the system is very significant. Also, the system's on-premises hardware gives customers more satisfaction. While the versatile functions make it a more comprehensive solution Review collected by and hosted on G2.com.

What do you dislike about FortiIsolator?

The user-friendly interface and versatile functions are excellent but sometimes finding things to setup is more difficult this is where software interface can be improved by adding more dashboards Review collected by and hosted on G2.com.

What problems is FortiIsolator solving and how is that benefiting you?

This software is very much helpful for us to get rid of many cyber attacks, blocking of websites are easier and the feature of blocking mobile phones are also very useful for us and there are many more things Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
CC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about FortiIsolator?

The FortiIsolator adds a layer of security that no other tool can add, which is ensuring that all browsed content is executed on a temporary sandbox instead of on the user machine. This adds an extra security layer on our company and minimize the chances of client-side attacks. Review collected by and hosted on G2.com.

What do you dislike about FortiIsolator?

Some specific applications (like web-VDIs) might not work well with this technology. But that's fine, we can whitelist some applications to bypass this feature. Review collected by and hosted on G2.com.

What problems is FortiIsolator solving and how is that benefiting you?

Adding protection against client-side attacks Review collected by and hosted on G2.com.

There are not enough reviews of FortiIsolator for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Mimecast Advanced Email Security Logo
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
2
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(123)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
3
Authentic8 Silo for Research Logo
Authentic8 Silo for Research
4.7
(103)
The Silo Web Isolation Platform — a secure, cloud-native execution environment for all web-based activity — underpins two core products: Silo for Safe Access and Silo for Research. Silo for Safe Access is an isolated workspace that allows IT to manage use of the web regardless of the access details or the role of the user. The end user receives a familiar browsing environment via benign video display. Silo for Research leverages the same browsing experience, IT control and security but adds a powerhouse of capabilities and automated features purpose-built for online investigators. The solution gives them the control to manage how their digital fingerprint appears to visited websites during the course of investigations — whether they be for law enforcement, trust and safety, cybersecurity intelligence or other purposes. This way, investigators can blend in with the crowd and not give away their identity of intent to investigative targets, which could cause them to disinform, go into hiding or retaliate against the investigator or their organization.
4
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(92)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(59)
Citrix Secure Browser is service protects the corporate network from browser-based attacks by isolating web browsing. It delivers consistent, secure remote access to internet hosted web applications with zero end-point configuration.
6
CylanceENDPOINT Logo
CylanceENDPOINT
4.3
(57)
CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In addition to providing complete visibility into attacks attempting to camouflage their actions amongst trusted components while simplifying investigation and response by grouping and prioritizing alerts and providing simple workflows and templates empowering junior analysts to operate as seasoned professionals. All of this is offered through an operationally efficient solution that ensures protection across all device types and whether online or offline.
7
Kasm Workspaces Logo
Kasm Workspaces
4.7
(45)
Workspaces is a modern, secure and cost-effective solution for remote browser isolation (RBI), containerized application streaming (CAS), virtualized desktop infrastructure (VDI) and desktop as a service (DaaS) that provides a remote desktop and remote work solution for your distributed workforce. The Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
8
iboss Logo
iboss
4.0
(15)
Replace VPN, SWG, SD-WAN, Firewall, CASB, and Browser Isolation with a Consolidated SaaS Network & Security Service.
9
Seraphic Web Security Logo
Seraphic Web Security
4.9
(13)
Seraphic can secure any version of any browser on any device to prevent phishing, spear-phishing, clickjacking, CSS injection, man-in-the-middle, and Zero-day and unpatched N-Day attacks that other vendors cannot. This means that your end-users can leverage any combination of browsers they prefer and you can centrally manage corporate policy and governance for browsing as well as enterprise/private apps and SaaS environments. Seraphic also includes robust policy and governance controls including state of the art DLP engines that scans all outbound and inbound data in any format for any file with a complete privacy first approach.
10
ManageEngine Browser Security Plus Logo
ManageEngine Browser Security Plus
4.4
(7)
Browser Security Plus is an enterprise browser management tool that helps IT administrators manage and secure browsers across networks. It enables them to enforce security policies, control browser extensions and plug-ins, sandbox and lockdown enterprise browsers and also ensure compliance with stipulated browser configurations to protect their networks from browser-based threats.
Show More