gptkbp:instance_of
|
gptkb:Company
|
gptkbp:aims_to
|
Detect and respond to threats
|
gptkbp:can_create
|
Alerts
|
gptkbp:can_provide
|
Incident Response
Threat Context
|
gptkbp:character_customization
|
Specific Industries
|
gptkbp:deployment
|
gptkb:Cloud_Computing_Service
On-Premises
|
gptkbp:developed_by
|
gptkb:Fortinet
|
gptkbp:enhances
|
gptkb:software
|
gptkbp:facilitates
|
Compliance Audits
|
https://www.w3.org/2000/01/rdf-schema#label
|
Forti Deceptor
|
gptkbp:integrates_with
|
gptkb:Forti_Gate
gptkb:software
|
gptkbp:is_accessible_by
|
Web Interface
|
gptkbp:is_available_for
|
Trial
|
gptkbp:is_available_in
|
Multiple Languages
|
gptkbp:is_available_on
|
Subscription Model
|
gptkbp:is_compatible_with
|
gptkb:HIPAA
gptkb:GDPR
Third-Party Tools
SIEM Solutions
PCIDSS
|
gptkbp:is_designed_for
|
Enterprise Environments
|
gptkbp:is_designed_to
|
Reduce False Positives
|
gptkbp:is_integrated_with
|
Threat Intelligence Feeds
|
gptkbp:is_optimized_for
|
Virtual Environments
|
gptkbp:is_part_of
|
gptkb:Company
gptkb:Fortinet_Security_Fabric
Incident Management Process
Threat Detection Ecosystem
Threat Hunting Strategy
|
gptkbp:is_recognized_by
|
Industry Analysts
|
gptkbp:is_scalable
|
Large Networks
|
gptkbp:is_supported_by
|
Documentation and Training
Fortinet Support Services
|
gptkbp:is_used_by
|
Security Operations Centers
|
gptkbp:is_used_for
|
Network Segmentation
Enhance Security Posture
|
gptkbp:is_used_in
|
gptkb:government_agency
gptkb:financial_services_company
gptkb:Educational_Institution
gptkb:shopping_mall
Healthcare
|
gptkbp:managed_by
|
Centralized Dashboard
|
gptkbp:offers
|
Real-time Monitoring
Customizable Policies
Threat Deception
|
gptkbp:provides
|
gptkb:Company
Automated Threat Detection
Deception Technology
Forensic Data
Visibility into Attacks
|
gptkbp:recognizes
|
gptkb:Advanced_Persistent_Threats
|
gptkbp:supports
|
Multi-Tenancy
Automated Response
|
gptkbp:uses
|
Virtual Decoys
|
gptkbp:utilizes
|
gptkb:software_framework
|
gptkbp:bfsParent
|
gptkb:Fortinet
|
gptkbp:bfsLayer
|
4
|