Statements (148)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:concert_tour
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:fortification
|
gptkbp:analyzes |
user activity
security events |
gptkbp:can_be_used_with |
logs from various sources
|
gptkbp:character_customization |
specific industries
|
gptkbp:collects |
log data
|
gptkbp:deployment |
cloud-based
on-premises hybrid cloud-based solution on-premises solution hybrid environments |
gptkbp:developed_by |
gptkb:Fortinet
|
gptkbp:developer |
gptkb:Fortinet
|
gptkbp:enables |
compliance reporting
|
gptkbp:features |
compliance reporting
incident response dashboards threat intelligence log management network visibility automated threat detection |
gptkbp:has |
gptkb:Company
gptkb:operating_system gptkb:document API access community support reporting tools alerting system |
https://www.w3.org/2000/01/rdf-schema#label |
Forti SIEM
|
gptkbp:includes |
dashboards
alerting capabilities alerting features |
gptkbp:integrates_with |
gptkb:Forti_Gate
third-party tools firewalls SIEM solutions Fortinet products SIEM platforms |
gptkbp:is_available_in |
gptkb:various_languages
multiple languages |
gptkbp:is_available_on |
gptkb:software
gptkb:multiple_platforms premises subscription model Fortinet website |
gptkbp:is_compatible_with |
gptkb:HIPAA
gptkb:Cloud_Computing_Service gptkb:GDPR cloud environments third-party tools various operating systems various network devices PCIDSS |
gptkbp:is_designed_for |
enterprise environments
security operations centers (SO Cs) |
gptkbp:is_designed_to |
reduce response time
improve security operations |
gptkbp:is_integrated_with |
security orchestration tools
|
gptkbp:is_optimized_for |
high performance
|
gptkbp:is_part_of |
gptkb:Fortinet_Security_Fabric
Fortinet product suite Fortinet's cybersecurity solutions Fortinet's product suite |
gptkbp:is_recognized_by |
gptkb:Forrester
gptkb:Gartner |
gptkbp:is_scalable |
gptkb:battle
large organizations |
gptkbp:is_used_by |
security teams
|
gptkbp:is_used_for |
gptkb:software
data loss prevention network monitoring policy enforcement security compliance threat detection compliance audits policy compliance threat hunting threat analysis data breach detection |
gptkbp:is_used_in |
gptkb:Educational_Institution
enterprise environments government sectors |
gptkbp:is_used_to |
detect anomalies
monitor security events |
gptkbp:is_utilized_in |
gptkb:software
compliance officers data breach prevention |
gptkbp:monitors |
gptkb:Io_T_devices
|
gptkbp:offers |
automated responses
customizable dashboards incident management real-time alerts user behavior analytics user-friendly interface customizable reports threat intelligence data correlation data retention policies incident response capabilities log management network segmentation advanced analytics threat hunting integration with SIEM solutions |
gptkbp:operating_system |
gptkb:operating_system
|
gptkbp:provides |
data visualization
incident management real-time monitoring risk assessment user behavior analytics endpoint protection real-time visibility threat intelligence data correlation network visibility security analytics forensic analysis automated threat detection security posture assessment network traffic analysis threat detection capabilities security posture management endpoint monitoring |
gptkbp:release_date |
gptkb:2017
|
gptkbp:setting |
specific use cases
|
gptkbp:supports |
API access
API integration cloud environments data encryption incident management incident response multi-tenancy multiple data sources real-time monitoring data retention policies log management various data sources large data volumes threat hunting incident response workflows |
gptkbp:target_audience |
security analysts
IT security teams incident responders |
gptkbp:uses |
gptkb:software_framework
|
gptkbp:utilizes |
gptkb:software_framework
|