Fortinet black logo

Overview

6.2.0
Copy Link
Copy Doc ID d3f895ac-6c6b-11e9-81a4-00505692583a:123172
Download PDF

Overview

Fortinet FortiAnalyzer securely aggregates log data from Fortinet devices (both physical and virtual) and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, users can filter and review records, including traffic, event, virus, attack, web content, and email data, mining the data to determine your security stance and assure regulatory compliance. FortiAnalyzer is one of several versatile Fortinet management products that provide a diversity of deployment types, growth flexibility, advanced customization through APIs and simple licensing.

Highlights of FortiAnalyzer for AliCloud include the following:

  • Pre-defined and customized charts help monitor, maintain, and identify attack patterns, acceptable use policies, and demonstrate policy compliance
  • Scalable architecture allows the device to run in collector or analyzer modes for optimized log processing
  • Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks

Overview

Fortinet FortiAnalyzer securely aggregates log data from Fortinet devices (both physical and virtual) and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, users can filter and review records, including traffic, event, virus, attack, web content, and email data, mining the data to determine your security stance and assure regulatory compliance. FortiAnalyzer is one of several versatile Fortinet management products that provide a diversity of deployment types, growth flexibility, advanced customization through APIs and simple licensing.

Highlights of FortiAnalyzer for AliCloud include the following:

  • Pre-defined and customized charts help monitor, maintain, and identify attack patterns, acceptable use policies, and demonstrate policy compliance
  • Scalable architecture allows the device to run in collector or analyzer modes for optimized log processing
  • Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks