Fortinet offers FortiClient, their endpoint security system emphasizing automated advanced threat protection, security fabric integration, secure remote access, endpoint quarantine, and a comprehensive reporting dashboard.
N/A
Microsoft Defender for Cloud Apps
Score 7.1 out of 10
N/A
Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker.
N/A
Pricing
FortiClient
Microsoft Defender for Cloud Apps
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
FortiClient
Microsoft Defender for Cloud Apps
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Specific pricing details for FortiClient services vary depending on the number of endpoints, the duration of the subscription, and the specific features included.
—
More Pricing Information
Community Pulse
FortiClient
Microsoft Defender for Cloud Apps
Features
FortiClient
Microsoft Defender for Cloud Apps
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Overall, my experience with the client is good, and because of its performance and lightweight, I recommend this software to my colleagues. Before this, I also used other apps for the same purpose, but my search ended when I came to Forticlient.
It is well suited if your team is working with Microsoft tools and Azure services. but if you are using other cloud service providers and don't want to spend efforts in learning integration with third-party software then this is not a great fit for you. overall we are very satisfied with the product. If your corporation with Microsoft tools then I would recommend it.
Virtually a one-click action connection to my work network while remote. I just enter my network username & Password, click connect, and I can access all the fileshares as if I were on-site.
Speed - I have used other virtual network clients in the past, and the speed while working remote with one of them (even on a high speed connection) was easily 10x slower than if I were physically on the network. FortiClient is different, where the speed degradation is on the magnitude of only 2-3x slower - A significant and noticeable difference compared to other clients on the market.
On MacOS, FortiClient has a little toolbar icon that gives me a status, as well as actions to quickly connect or disconnect from my work network. It is a small thing, but a super handy feature!
font way too small on login, unable to select an option, for example, to see each letter of password as typed promotes errors at login
login errors and failure rate extremely high as [reported] by all our physicians and other providers: not infrequently one will have to return to office after hours in order to complete charts or access charts to answer patient after hours questions
frequent disconnects in spite of excellent internet signal
Because the software is very simple and easy to use, very efficient, and has a stable connection that allows the user to perform tasks without problems. Also, this software does not need to be configured by IT technicians, since it comes with a very developed and understandable set up guide.
We have used Forticlient for a number of years now and have found only minor faults with the application. The fact that our end users request little to no training to be able to utilize our VPN says a lot compared to the product we previously used to use for similar tasks. The Forticlient shield is a quick way to 'demonstrate confidence in security' at a glance among our end users - if you see the shield, you are protected. The only downside we've experienced is a few false positive AV detections, but this is more linked to Fortiguard labs/signatures.
The interface is pretty simple and easy to use; however, you will need to do a lot of investigative research on your own to get comfortable with it. Originally, many of the Microsoft security tools had their own seperate consoles. Overtime, they have blended into one interface which is the ideal state. In some cases it is clear Microsoft had to pick which console a certain feature or setting was going to reside in and this leads to some confusion. For example, DLP is managed through Defender for Cloud Apps but you will also need to jump into Purview. For things like reverse proxy on your M365 tenant, you will need to go into Azure and setup conditional access rules. Not a big problem and I can understand why the settings are located where they are but for someone just starting out with Defender for Cloud Apps, it will take some time to figure out.
FortiClient is a security suite with which we can keep our equipment well-protected. And it is that in a system like Windows, which is always the target of all kinds of attacks, it is not enough to have a simple antivirus.
I have not utilized actual support but the Sales and Product teams have been super helpful in moving our implementation forward and showing us the best practices.
My current organization is using FortiClient and they decided to use it since longer period. The main advantages is we are using it for connect RDP and and access private URL. But main reason is one time configuration is help us to connect it any time from anywhere. It's sending OTP to the work mail and helps us to validate it. While Cisco or other VPN ask mobile OTP auth or authenticator app which is much complex process. Hence FortiClient is best!
Microsoft Defender for Cloud Apps was chosen primarily due to its ability to work perfectly within our mostly M365 environment. Given that this was an added feature of our E5 license, we chose to dive into it and use it due to it's good visibility into user actions and the ability to tie all M365 actions together into one place. We did not see similar visibility with other tools that we vetted
Cloud App Security saves us thousands of dollars finding and rectifying apps security issues
Identity Security Posture helps the organization identity stay in shape, saving thousands of dollars on security consultations
The cost of suffering a breach cannot be quantified, CAS helps minimize the chances of the attackers succeeding, with excellent historical logging for most operations