FortiGate-120G Hardware plus 3 Year FortiCare Premium and FortiGuard Unified Threat Protection (UTP)
Converged Next-Generation Firewall (NGFW) and SD-WAN The FortiGate Next-Generation Firewall 120G series is ideal for building security-driven networks at distributed enterprise sites and transforming WAN architecture at any scale. With a rich set of AI/ML-based FortiGuard security services and our integrated Security Fabric platform, the FortiGate 120G series delivers coordinated, automated, end-to-end threat protection across all use cases. FortiGate has the industrys first integrated SD-WAN and zero-trust network access (ZTNA) enforcement within an NGFW solution and is powered by one OS. FortiGate 120G automatically controls, verifies, and facilitates user access to applications, delivering consistency with a seamless and optimized user experience.
FortiOS Everywhere
FortiOS, Fortinets Advanced Operating System
FortiOS enables the convergence of high performing networking and security across the
Fortinet Security Fabric. Because it can be deployed anywhere, it delivers consistent and
context-aware security posture across network, endpoint, and multi-cloud environments.
FortiOS powers all FortiGate deployments whether a physical or virtual device, as a container,
or as a cloud service. This universal deployment model enables the consolidation of many
technologies and use cases into organically built best-of-breed capabilities, unified operating
system, and ultra-scalability. The solution allows organizations to protect all edges, simplify
operations, and run their business without compromising performance or protection.
FortiOS dramatically expands the Fortinet Security Fabrics ability to deliver advanced AI/MLpowered services, inline advanced sandbox detection, integrated ZTNA enforcement, and
more. It provides protection across hybrid deployment models for hardware, software, and
Software-as-a-Service with SASE.
FortiOS expands visibility and control, ensures the consistent deployment and enforcement of
a simplified, single policy and management framework. Its security policies enable centralized
management across large-scale networks with the following key attributes:
Interactive drill-down and topology viewers that display real-time status
On-click remediation that provides accurate and quick protection against threats and
abuses
Unique threat score system correlates weighted threats with users to prioritize
investigations