Fortinet FortiClient Endpoint Telemetry & Compliance License Subscription for 100 Clients for 3 Years – Includes 24×7 support.

SKU: FC1-10-C1100-151-02-36 Category: Brand: Fortinet

This product has been discontinued.


Lock down visibility and control of your software and hardware inventory across the entire security fabric. Identify vulnerable or compromised hosts and track all details of systems and user profiles across your attack surface. 

FortiClient’s Security Fabric Integration, ensures that all fabric components – FortiGate, FortiAnalyzer, EMS, Managed AP, Managed Switches, Sandbox – have a unified view of endpoints in order to provide tracking & awareness, compliance enforcement and reporting. Advanced Threat Protection automates prevention of known and unknown threats through built-in host-based security stack and integration with FortiSandbox. Easy to use Secure Remote Access & Mobility via SSL and IPsec VPN. FortiClient connects every endpoint to form a cohesive security fabric. 

EMS for Central Management

  • Simple & User Friendly UI
  • Remote FortiClient Deployment
  • Realtime Dashboard
  • Software Inventory Management
  • Active Directory Integration
  • Central Quarantine Management
  • Automatic Group Assignment
  • Automatic Email Alerts
  • Supports Custom Groups
  • Remote Triggers

FortiClient Benefits: 

Unified endpoint features including compliance, protection, and secure access into a single, modular lightweight client.

End-to-end threat visibility and control by natively integrating endpoint into the Security Fabric architecture.

Advanced threat protection against exploits and advanced malware, powered by FortiGuard along with FortiSandbox integration. 

Integrated patch management and vulnerability shielding to harden all endpoints.

Simplified management and policy enforcement with Enterprise Management Server (EMS) and FortiGate, respectively.

Advanced Threat Protection

As a next-generation endpoint protection solution, FortiClient helps connect endpoints to FortiSandbox, which uses behavior-based analysis to automatically analyze in real-time all files downloaded to FortiClient endpoints. Millions of FortiClient and FortiSandbox users worldwide share information about known and unknown, malware with cloud-based FortiGuard. FortiGuard automatically shares the intelligence with other FortiSandbox units and FortiClient endpoints to prevent attacks from known and unknown malware.

Security Fabric Integration

As a key piece of the Fortinet Security Fabric, FortiClient integrates the endpoints into the Fabric for early detection and prevention of advanced threats and delivers endpoint visibility, compliance control, vulnerability management and automation. With 6.0, FortiOS & FortiAnalyzer leverages FortiClient endpoint telemetry intelligence to identify Indicator of Compromise (IoC). With the Automation capability, admins can investigate real-time and set policies to automate responses including quarantining suspicious or compromised endpoints to contain incidents and stem outbreaks. Fortinet’s endpoint compliance & vulnerability management features simplifies the enforcement of enterprise security policies preventing endpoints from becoming easy attack targets. 

Secure Remote Access & Mobility

FortiClient uses SSL and IPSec VPN to provide secure, reliable access to corporate networks and applications from virtually any internet connected remote location. FortiClient simplifies remote user experience with built-in auto-connect and always-up VPN features. TwoFactor authentication can also be used to provide additional layer of security. Feature like, VPN autoconnect, Always up, Dynamic VPN Gateway Selection and split-tunneling ensures smooth user experience on all device types connecting from home or public places. 


This behavioral-based detection technology protects against zero-day attacks that target applications with zero-day or unpatched vulnerabilities.

Protects against zero-day attacks targeting undiscovered or unpatched application vulnerabilities 

Detects various memory techniques used in an exploit, such as ROP, HeapSpray, bufferoverflow

Blocks File Less Attacks powershell & other scripted attacks

Shields web browsers, Java/Flash plug-ins, Microsoft Office applications, and PDF Reader

Identifies and Blocks exploit kits, prevents drive-by downloads

Signature-less solution

Additional information

Weight 0.00 lbs