Next Generation Endpoint Protection

Integrated endpoint protection platform that provides automated next-generation threat protection, visibility and control of your software and hardware inventory across the entire security fabric. Identify & remediate vulnerable or compromised hosts across your attack surface.
  • Provides Endpoint Visibility & Compliance throughout security fabric
  • Prevent Known Vulnerabilities from Being Exploited by Attackers
  • Automated behaviour based protection against unknown threats
  • Simplified Endpoint Management
Your free download comes with regular updates to ensure the latest threat data and intelligence is protecting your devices.
NSS Labs 2018 Advanced Endpoint Protection (AED) Test

FortiClient is a top performer and "Recommended" by NSS labs in its 2018 Advanced Endpoint Protection (AEP) group test. NSS Labs expanded the scope of the AEP test and included malware, exploits, blended threats (combinations of threats), false positives, and evasions. FortiClient with integrated Sandbox blocked 100% exploits, 100% document and script-based attacks; 100% web and email attack, and offline threats with zero false positives.

Learn More
Integrate Endpoints to Fortinet Security Fabric

As a key piece of the Fortinet Security Fabric, FortiClient integrates endpoints into the fabric for early detection and prevention of advanced threats. Security events including zero-day malware, botnet detections, and vulnerabilities are reported in real-time.

The deep real-time visibility into the network allows administrators to investigate and remotely quarantine compromised endpoints. Endpoint protection is more than just antimalware protection, the endpoint compliance and vulnerability detection features enable simplified enforcement of enterprise.

Automated Security Fabric Protection

FortiClient is an integral part of Fortinet Security Fabric. It connects endpoints with Security Fabric and delivers endpoint visibility, compliance control, vulnerability management and automation.

FortiClient shares endpoint telemetry with Security Fabric and with release 6.0 FortiOS & FortiAnalyzer leverage this telemetry intelligence to identify Indicators of Compromise (IoC).

By utilizing the automation capabilities of FortiClient administrators can set policies to automatically quarantine suspicious or compromised endpoints in order to contain incidents and stem outbreaks.

Vulnerability Management
FortiClient Vulnerability Management solution helps you detect OS and third-party Application vulnerabilities in real time across your attack surface.
Detect
Detect OS & third-party application vulnerabilities that can be exploited by attackers.
Report
Show consolidated view of all vulnerabilities for entire attack surface so vulnerabilities in critical assets can be identified & prioritized.
Remediation
Automate vulnerability patching so critical assets are always secured
Enforce
Compliance check restricts network access for vulnerable endpoints until they are no longer a security risk
Automated Advanced Threat Protection and Detection

As a next-generation endpoint protection solution, FortiClient helps connect endpoints to FortiSandbox, which uses behaviour-based analysis to automatically analyze in real-time all files downloaded to FortiClient endpoints. Millions of FortiClient and FortiSandbox users worldwide share information about known and unknown, malware with cloud-based FortiGuard. FortiGuard automatically shares the intelligence with other FortiSandbox units and FortiClient endpoints to prevent attacks from known and unknown malware. By integrating with FortiSandbox and cloud-based FortiGuard Global Threat Intelligence, FortiClient automatically detects and prevents zero-day, advanced malware and known threats.

Secure Remote Access

FortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet-connected remote location. FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. Two-Factor authentication can also be used to provide an additional layer of security.


FortiClient for Linux

FortiClient for Linux protects Linux desktops and servers against malware by leveraging real-time scanning and detecting vulnerabilities before attackers can exploit them. FortiClient also utilizes Sandbox threat intelligence to detect and block zero-day threats that have not been seen before.

The FortiClient Fabric Agent module aids in integrating Linux endpoints with other devices in the Fortinet Security Fabric, providing in-depth visibility into your attack surface for real-time risk awareness and quick reponse to your most serious threats.

Feature Highlights
  • Detects & Quarantines Malware using real-time, on-demand or scheduled scans
  • Leverages Sandbox Threat Intelligence for behaviour-based detection
  • Supports Security Fabric Telemetry for Attack Surface Visibility
  • Proactive prevention Vulnerability Detection & Patching
  • Central Management using FortiClient EMS
FortiClient Anti-Exploit

FortiClient anti-exploit technology protects your endpoint against advanced threats including zero-day attacks, which target application vulnerabilities that have yet to be discovered or patched. Our advanced technology provides an additional layer of protection by monitoring the host memory to detect and block various memory techniques including return-oriented programing (ROP), heap spraying, and others.

Anti-Exploit Highlights
  • Protects against zero-day or undiscovered application vulnerabilities
  • Protects against various memory techniques used in an exploit
  • Protects against drive-by download attacks
  • Shields web browsers (Internet Explorer, Chrome, Firefox, Opera), Java/Flash plug-ins, Microsoft Office applications, and PDF readers
  • Detects & blocks the use of exploit kits
  • Signature less solution
Simplified Endpoint Management

With an ever growing number of endpoints (workstations, servers, laptops, tablets and smart phones) in an organization, the management of IT assets is becoming a challenge. Without real-time central management, it is hard to monitor the attack surface, manage vulnerabilities, enforce security compliance, and track changes.

Key Features
  • Remote FortiClient Deployment
  • Windows AD Integration
  • Automatic Provisioning of New Devices
  • Centralized Client Provisioning & Monitoring
  • Dashboard Providing Endpoint Alerts and Summary
  • Vulnerability Management
  • Software Inventory Management
  • Automatic Group Assignment

Your free trial includes access to all central management features.

Software Inventory Management

With the new Software Inventory module administrators gain visibility into software installed on the endpoint. In addition to managing licenses software inventory can improve security hygiene. When installed software is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise. Companies can set policy to remove outdated & unwanted applications.