Statements (61)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Fortinet
|
gptkbp:can_provide |
in compliance audits
|
gptkbp:controls |
wired and wireless devices
|
gptkbp:deployment |
on-premises
in the cloud |
gptkbp:developed_by |
gptkb:Fortinet
|
gptkbp:enables |
automated response to security incidents
|
gptkbp:enforces |
security policies
network access policies |
https://www.w3.org/2000/01/rdf-schema#label |
Forti NAC
|
gptkbp:includes |
dashboard for network visibility
|
gptkbp:integrates_with |
gptkb:Forti_Gate_firewalls
identity management systems SIEM solutions |
gptkbp:intelligence |
security policy updates
device onboarding process |
gptkbp:is_compatible_with |
various operating systems
third-party security tools |
gptkbp:is_designed_for |
large-scale networks
|
gptkbp:is_designed_to |
enhance network security posture
|
gptkbp:is_part_of |
gptkb:Fortinet_Security_Fabric
Fortinet's cybersecurity solutions |
gptkbp:is_recognized_by |
vulnerable devices
|
gptkbp:is_used_by |
enterprises for network security
|
gptkbp:is_used_for |
network visibility and control
detect rogue access points manage BYOD policies |
gptkbp:is_used_to |
reduce attack surface
secure enterprise networks |
gptkbp:managed_by |
web interface
|
gptkbp:monitors |
guest access activity
|
gptkbp:offers |
real-time threat intelligence
customizable alerts data analytics features endpoint security features network segmentation capabilities guest networking capabilities real-time monitoring of network traffic |
gptkbp:provides |
compliance reporting
network performance monitoring user identity management incident response workflows visibility into network devices automated device classification detailed device profiling policy enforcement for network access risk assessment for devices |
gptkbp:recognizes |
unauthorized devices
|
gptkbp:suitable_for |
regulated industries
|
gptkbp:supports |
API access
multi-tenancy role-based access control network forensics multiple authentication methods dynamic segmentation Io T device management VPN integration |
gptkbp:track |
device compliance status
|
gptkbp:utilizes |
machine learning for threat detection
|