Statements (73)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:developed_by |
gptkb:Fortinet
|
gptkbp:enables |
policy enforcement
threat detection endpoint profiling |
gptkbp:enhances |
security posture
|
gptkbp:facilitates |
compliance reporting
|
gptkbp:hosted_by |
cloud platforms
|
https://www.w3.org/2000/01/rdf-schema#label |
Forti NAC Cloud
|
gptkbp:improves |
incident response
|
gptkbp:integrates_with |
gptkb:Forti_Gate
|
gptkbp:is_accessible_by |
web interface
|
gptkbp:is_compatible_with |
various devices
various operating systems various network devices |
gptkbp:is_part_of |
gptkb:Fortinet_Security_Fabric
network security solutions Fortinet product suite |
gptkbp:is_scalable |
to enterprise needs
|
gptkbp:is_used_by |
enterprises
|
gptkbp:is_used_for |
access control
network monitoring policy management network risk management |
gptkbp:monitors |
network traffic
|
gptkbp:offers |
data loss prevention
API access customizable dashboards data analytics incident management real-time alerts role-based access control security assessments user behavior analytics data integrity checks automated response network compliance network performance monitoring user activity tracking |
gptkbp:provides |
user authentication
risk assessment security policies user access control threat intelligence automated workflows network visibility security analytics guest management network configuration management network insights device onboarding network access policies security incident tracking network threat analysis |
gptkbp:reduces |
security risks
|
gptkbp:supports |
gptkb:Io_T_devices
VPN connections cloud security data encryption data protection multi-tenancy security compliance third-party integrations network segmentation remote access incident response plans security frameworks BYOD policies multiple authentication methods network audits |
gptkbp:utilizes |
cloud architecture
|
gptkbp:bfsParent |
gptkb:Fortinet
|
gptkbp:bfsLayer |
4
|