Fortinet FortiAnalyzer VM-100 1TB

  • Fortinet
  • 13361711
  • FAZ-VM-100
  • In Stock
  • Virtual delivery
Ordering Information
FortiAnalyzer-VM integrates network logging, analysis, and reporting into a single system, delivering increased knowledge of security events throughout a network. Utilizing virtualization technology, FortiAnalyzer-VM is a software-based version of the FortiAnalyzer hardware appliance and is designed to run on VMware hardware platforms. It offers all the features of the FortiAnalyzer hardware appliance.

FortiAnalyzer-VM provides organizations of any size with centralized security event analysis, forensic research, reporting, content archiving, data mining, malicious file quarantining and vulnerability assessment. Centralized collection, correlation, and analysis of geographically and chronologically diverse security data from Fortinet appliances and third-party devices deliver a simplified, consolidated view of your security posture.

The FortiAnalyzer-VM family minimizes the effort required to monitor and maintain acceptable use policies, as well as identify attack patterns that can be used to fine tune the security policy, thwarting future attackers. In addition, FortiAnalyzer-VM provides detailed data capture that can be used for forensic purposes to comply with regulations and policies regarding privacy and disclosure of information security breaches.

You can put time back in your day by deploying a FortiAnalyzer-VM into your security infrastructure, creating a single view of your security events, archived content, and vulnerability assessments. FortiAnalyzer-VM accepts a full range of data from Fortinet solutions, including traffic, event, virus, attack, content filtering, and email filtering data. It eliminates the need to manually search multiple log files or manually analyze multiple consoles when performing forensic analysis or network auditing. FortiAnalyzer-VM central data archiving, file quarantine and vulnerability assessment functionality further reduces the amount of time you need to spend managing the range of security activity in your enterprise or organization.