Fortinet offers FortiClient, their endpoint security system emphasizing automated advanced threat protection, security fabric integration, secure remote access, endpoint quarantine, and a comprehensive reporting dashboard.
N/A
Norton
Score 8.3 out of 10
N/A
The Norton products, including Norton 360, Norton Antivirus, and Norton Security, are consumer antivirus and privacy protection products, and are now a product line of NortonLifeLock (formerly Symantec) after the enterprise security division of Symantec was acquired and is now part of Broadcom.
We use FortiClient because we use Fortinet products in our office. Compared to other endpoint security software we've used in the past, FortiClient does everything else others do.
FortiClient is really well suited for providing remote employees super quick access to a local network without needing much technical know-how. The virus scanning and web-blocking is also really great at making sure to keep the spam, ads, and other malicious web connections at bay. I have not run into any specific scenario that FortiClient has not been well suited - All of the scenarios in which I have used FortiClient have all functions really well for me.
For a stand-alone business this should do the trick, but if using across multiple clients (multi-tenancy not an option). Default settings within the program will cause performance issues if not tweaked, meaning someone with networking experience may be necessary. Not ideal for MSP's unless they only have a few clients, as the manageability must be done within "the walls" of each company.
[FortiClient] splits the traffic very well. For example, when users connect a VPN to the office they are connecting to the internal system which uses VPN traffic. If users access the public internet they use the internet traffic, but [Fortinet] does not route this traffic back to the office.
font way too small on login, unable to select an option, for example, to see each letter of password as typed promotes errors at login
login errors and failure rate extremely high as [reported] by all our physicians and other providers: not infrequently one will have to return to office after hours in order to complete charts or access charts to answer patient after hours questions
frequent disconnects in spite of excellent internet signal
Poor performance against Spyware and other threats despite claiming to act against them (recognizes very few and eliminates less) It is limited to viruses.
Regular blocking of incoming scripts (in front of other antivirus)
Little or almost no compatibility with the Windows XP Firewall, but they are involved.
Because the software is very simple and easy to use, very efficient, and has a stable connection that allows the user to perform tasks without problems. Also, this software does not need to be configured by IT technicians, since it comes with a very developed and understandable set up guide.
Usability is pretty solid. It is not as easy to manage and adjust if you are not a trained IT professional, which requires smaller companies without IT staff to reply on outsourced IT partners. The user interface is a bit clunky, but you can generally figure out what you need to do, it just takes a little bit of time and effort.
FortiClient is a security suite with which we can keep our equipment well-protected. And it is that in a system like Windows, which is always the target of all kinds of attacks, it is not enough to have a simple antivirus.
Meraki MX has a much more basic set of features compared to FortClient and the Fortinet ecosystem of devices and software. Setting up a FortiGate with FortiClient can take a little more time, but the feature set is much richer. We use Meraki MX is a few offices, but are now converting many of them over to the FortiClient and Fortinet suite of security devices and software.
Using a hosted model, we know we are always getting the best core cybersecurity, but for the endpoints, we don't need something as complex as FireEye, and we wanted more than Lookout was able to provide. Lookout was terrific, and it came already installed with many of our phones. But we chose to proactively seek out a cyber solution that mapped to our policies.