The FortiAnalyzer-200D is ideal for small organizations and provides advanced security analysis and management functions. You can analyze threat information and network traffic to assess your security posture. You can also quarantine archived files, correlate events, and assess network vulnerabilities. Over 450 customizable reports assist in monitoring and measuring trends and policy compliance.
The FortiAnalyzer-300D is a Network Security Logging, Analysis, and Reporting Appliance designed for smaller networks and mid-enterprise organizations, It puts advanced features, such as event correlation, forensic analysis, and vulnerability assessment into the hands of smaller networks. FortiAnalyzerís pre-defined and customizable reports help you identify and isolate attack patterns, monitor and maintain acceptable use policies, and demonstrate policy and regulatory compliance.
The FortiAnalyzerô-1000D Centralized Logging and Reporting Appliances designed for medium to large organizations securely Aggregates, Analyzes, and Reports on your network log data gathered from Fortinet devices and other syslog-compatible devices. Over 300 customizable graphical reports help you measure your policy compliance, monitor acceptable use policies, identify attack patterns, and comply with regulations regarding privacy and disclosure of security breaches.
The FortiAnalyzerô-2000B appliance meets the analytic needs of large organizations. It provides advanced security management functions such as traffic analysis, quarantined file archiving, event correlation, and network vulnerability assessments. It also streamlines your archiving of email, Web access, instant messaging, and file transfer content.
The FortiAnalyzer-3000D Network Security Logging, Analysis, and Reporting Appliance is designed for large organizations and multi-tenant environments. It securely aggregates log data from Fortinet Security Appliances for advanced analysis of network and device activity. A comprehensive suite of easily customable reports allows you to quickly analyze and visualize network threats, inefficiencies and usage.