www.fortinet.com Open in urlscan Pro
3.123.216.247  Public Scan

URL: https://www.fortinet.com/corporate/about-us/privacy?elqTrackId=c63d582aAB12ABCDEFGHIJKLMNOPQ4f0&elq=84386def5AB12ABCDEFGH...
Submission: On August 22 via api from CH — Scanned from DE

Form analysis 3 forms found in the DOM

GET /search

<form id="sitesearch" action="/search" method="get">
  <button aria-label="Search Toggle" aria-expanded="false" aria-controls="search">
    <svg id="Layer_search" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 137.82 139.77" width="21" height="21">
      <path class="cls-1" d="M120.76,136.84l-37-37L97.86,85.68l37,37a10,10,0,0,1,0,14.13h0A10,10,0,0,1,120.76,136.84Z"></path>
      <path class="cls-1" d="M56,112a56,56,0,1,1,56-56A56.08,56.08,0,0,1,56,112Zm0-99A43,43,0,1,0,99,56,43,43,0,0,0,56,13Z"></path>
    </svg>
  </button>
  <label for="search">Search</label>
  <input id="search" name="q" type="text" class="hidden" placeholder="Search">
  <input type="hidden" name="site" id="site" disabled="" value="https://www.fortinet.com">
</form>

<form class="ftnt-subscribe-form">
  <div class="form-control">
    <label for="email">Enter Email Address</label>
    <input type="email" required="required" id="email" name="emailAddress" placeholder="Enter Email Address">
    <button type="submit">
      <img src="/content/dam/fortinet/images/icons/submit-arrow.svg" alt="Submit" width="24" height="24">
    </button>
  </div>
  <div role="status" class="ftnt-subscribed" style="margin-bottom: 17px;display:none;color:#da291c;">
    <p> Subscription Successful!</p>
  </div>
  <div class="ftnt-subscription-failed" style="margin-bottom: 17px;display:none;color:#da291c;">
    <p> Request Failed. Please try again later!</p>
  </div>
  <div class="form-checkbox">
    <label for="terms">
      <input type="checkbox" tabindex="-1" required="required" value="on" name="consentCheckbox" id="terms">
      <span tabindex="0" class="checkmark"></span>
    </label>
    <p></p>
    <p>I want to receive news and product emails. Read our&nbsp;<a href="/corporate/about-us/privacy">privacy policy</a>.</p>
    <p></p>
  </div>
  <input type="hidden" name="languagecountry" value="en-us">
  <input type="hidden" name="eloquaFormAction" value="https://s3049749.t.eloqua.com/e/f2">
  <input type="hidden" name="HFcampaignID" value="7012H000001dWu1QAE">
  <input type="hidden" name="HFemailID">
  <input type="hidden" name="elqSiteId" value="3049749">
  <input type="hidden" name="elqFormId" value="form420">
  <input type="hidden" name="elqFormName" value="WebsiteSubscription">
  <input type="hidden" name="memberStatus" value="Responded">
  <input type="hidden" name="assetName" value="Privacy Policy">
  <input type="hidden" name="assetUrl" value="https://www.fortinet.com/corporate/about-us/privacy">
  <input type="hidden" name="last-page-visit" value="">
  <input type="hidden" id="formChecker" name="formChecker" value="">
  <input type="hidden" id="utmsource" name="utmsource" value="">
  <input type="hidden" id="utmmedium" name="utmmedium" value="">
  <input type="hidden" id="utmcampaign" name="utmcampaign" value="">
  <input type="hidden" id="utmterm" name="utmterm" value="">
  <input type="hidden" id="utmcontent" name="utmcontent" value="">
  <input type="hidden" name="hiddenField2" value="Website">
  <input type="hidden" name="mid" value="">
  <input type="hidden" name="servertype" value="fortinetincproduction">
  <input type="hidden" name="languagecode" value="EN">
  <input type="hidden" name="country" value="">
</form>

<form class="ftnt-subscribe-form">
  <div class="form-control">
    <label for="email">Enter Email Address</label>
    <input type="email" required="required" id="email" name="emailAddress" placeholder="Enter Email Address">
    <button type="submit">
      <img src="/content/dam/fortinet/images/icons/submit-arrow.svg" alt="Submit" width="24" height="24">
    </button>
  </div>
  <div role="status" class="ftnt-subscribed" style="margin-bottom: 17px;display:none;color:#da291c;">
    <p> Subscription Successful!</p>
  </div>
  <div class="ftnt-subscription-failed" style="margin-bottom: 17px;display:none;color:#da291c;">
    <p> Request Failed. Please try again later!</p>
  </div>
  <div class="form-checkbox">
    <label for="terms">
      <input type="checkbox" tabindex="-1" required="required" value="on" name="consentCheckbox" id="terms">
      <span tabindex="0" class="checkmark"></span>
    </label>
    <p></p>
    <p>I want to receive news and product emails. Read our&nbsp;<a href="/corporate/about-us/privacy">privacy policy</a>.</p>
    <p></p>
  </div>
  <input type="hidden" name="languagecountry" value="en-us">
  <input type="hidden" name="eloquaFormAction" value="https://s3049749.t.eloqua.com/e/f2">
  <input type="hidden" name="HFcampaignID" value="7012H000001dWu1QAE">
  <input type="hidden" name="HFemailID">
  <input type="hidden" name="elqSiteId" value="3049749">
  <input type="hidden" name="elqFormId" value="form420">
  <input type="hidden" name="elqFormName" value="WebsiteSubscription">
  <input type="hidden" name="memberStatus" value="Responded">
  <input type="hidden" name="assetName" value="Privacy Policy">
  <input type="hidden" name="assetUrl" value="https://www.fortinet.com/corporate/about-us/privacy">
  <input type="hidden" name="last-page-visit" value="">
  <input type="hidden" id="formChecker" name="formChecker" value="">
  <input type="hidden" id="utmsource" name="utmsource" value="">
  <input type="hidden" id="utmmedium" name="utmmedium" value="">
  <input type="hidden" id="utmcampaign" name="utmcampaign" value="">
  <input type="hidden" id="utmterm" name="utmterm" value="">
  <input type="hidden" id="utmcontent" name="utmcontent" value="">
  <input type="hidden" name="hiddenField2" value="Website">
  <input type="hidden" name="mid" value="">
  <input type="hidden" name="servertype" value="fortinetincproduction">
  <input type="hidden" name="languagecode" value="EN">
  <input type="hidden" name="country" value="">
</form>

Text Content

Skip to content Skip to navigation Skip to footer
Skip to content

Cyber Readiness Center and Breaking Threat Intelligence: Click here to get the
latest recommendations and Threat Research

 * Free Product Demo
 * Discover More
   
   
   CORPORATE
   
    * About Us
    * Executive Management
    * Public Sector Advisory Council
    * Contact Us
    * Careers
    * Early Talent Program
    * Social Responsibility
    * Investor Relations
    * Newsroom
    * Executive Briefing Centers
   
   
   TRAINING
   
    * Training Institute
    * Certification Program
    * Authorized Training Centers
    * Security Awareness Training
    * Education Outreach Program
    * Academic Partner Program
    * Veterans Program
    * Free Training & On-Demand Labs
    * Login to NSE Platform
   
   
   RESOURCES
   
    * Resource Center
    * Blog
    * CyberGlossary
    * Product Certifications
    * Customer Stories
    * Fortinet Icon Library
    * Events & Webinars
    * Fuse Community
    * Analyst Reports
    * Ordering Guides
    * Fortinet Contracts & Grants

 * SUPPORT
   Experienced a Breach? FortiCare Support Services Product Demo Center Product
   Downloads Product Registration Documents Library Fortinet Community Contact
   Support
 * Services
   
 * Support
   
 * Login to FortiCloud
   username
   
   
 * Search
 * * USA (English)
   * Germany (Deutsch)
   * France (Français)
   * Italy (Italiano)
   * Russia (Русский)
   * Japan (日本語)
   * Korea (한국어)
   * China (简体中文)
   * Taiwan (繁體中文)
   * Brazil (Portugués)
   * Latin America
     (Español)
   * 

 * Enterprise
   Network Security
   
   
   NETWORK SECURITY
   
    * Next-Generation Firewall
    * Intrusion Prevention Systems (IPS)
    * Secure Web Gateway (SWG)
   
   
   NOC MANAGEMENT
   
    * Central Management
    * Digital Experience Monitoring
   
   
   USE CASES
   
    * Hyperscale Security
    * Internal Segmentation
    * Network Automation
   
   
   QUICK LINKS
   
    * Security-Driven Networking Explained
    * Zero Trust Edge
    * Analyst Reports
    * Product Certifications
    * Products A-Z
   
   Enterprise Networking
   
   
   ENTERPRISE NETWORKING
   
    * Secure SD-WAN
    * Switching
    * Wireless LAN (WLAN)
    * Network Access Control (NAC)
    * LTE/5G Gateway
    * Artificial Intelligence for IT Operations
    * Secure Work-From-Home
   
   
   BUSINESS INFRASTRUCTURE
   
    * Voice and Collaboration
    * Video Surveillance
   
   
   USE CASES
   
    * Multi-Cloud SD-WAN
    * Secure SD-Branch
    * Campus Networks
    * Teleworker at Scale
    * Unified Communications
   
   
   QUICK LINKS
   
    * Network Operations Explained
    * Analyst Reports
    * Products A-Z
   
   Zero Trust Access
   
   
   ZTNA
   
    * Zero Trust Network Access (ZTNA)
    * Fabric & VPN Agent
   
   
   SASE
   
    * Cloud-Delivered Security
   
   
   IDENTITY
   
    * Identity Access Management (IAM)
    * Identity as-a-Service
   
   
   USE CASES
   
    * Teleworking at Scale
    * Control Access & Rights for Every User
    * Work from Anywhere
   
   
   QUICK LINKS
   
    * Zero Trust Access Explained
    * FortiClient Download
    * Products A-Z
    * Analyst Reports
   
   Cloud Security
   
   
   HYBRID CLOUD SECURITY
   
    * Virtual Network Firewall
    * Denial-of-Service (DDoS) Protection
   
   
   CLOUD-NATIVE PROTECTION
   
    * Workload Protection & Cloud Security Posture Management
    * DevSecOps
   
   
   WEB APPLICATION / API PROTECTION
   
    * Web Application Firewall
    * Application Delivery and Server Load-Balancing
   
   
   SAAS SECURITY
   
    * Email Security
    * Cloud Access Security Broker (CASB)
   
   
   USE CASES
   
    * AWS
    * Azure
    * Google Cloud
    * Microsoft 365
    * SAP
   
   
   QUICK LINKS
   
    * Cloud Security Explained
    * Analyst Reports
    * Free Trials
    * Products A-Z
   
   Security Operations
   
   
   SOC ANALYTICS PLATFORMS
   
    * Analytics & Reporting
    * SIEM
    * SOAR
   
   
   ENDPOINT SECURITY
   
    * EDR
    * MDR
    * XDR
   
   
   MANAGED SOC
   
    * SOC-as-a-Service
   
   
   ADVANCE DETECTION & PROTECTION
   
    * IL Malware Analysis
    * NDR
    * Deception Systems
    * DRPS (EASM|BP|ACI)
   
   
   USE CASES
   
    * Insider Risk
    * Security Automation
    * Ransomware Protection
    * Phishing Protection
    * Platform Consolidation
    * Risk and Compliance
   
   
   QUICK LINKS
   
    * Security Operations Explained
    * FortiGuard Labs
    * Independent Testing
    * Analyst Reports
    * Products A-Z
   
   Threat Intel & Response
   
   
   FORTIGUARD AI-POWERED SECURITY
   
    * FortiGuard Security Portfolio
    * Content Security: AV, IL-Sandbox, credentials
    * Web Security: URL, DNS, Video
    * Device Security: IPS, IoT, OT, botnet/C2
   
   
   FORTIGUARD REAL TIME THREAT INTELLIGENCE
   
    * FortiGuard Labs Research
   
   
   INCIDENT RESPONSE (IR)
   
    * Incident Response
    * Zero Days & Outbreak Alerts
   
   
   SECURITY ASSESSMENTS & READINESS
   
    * Security Assessments & Readiness
    * IRR, Playbooks & Tabletop
    * Security & Brand Assessments
    * Cybersecurity Prof Education
    * Security Awareness & Training
   
   
   USE CASES
   
    * Security for the network
    * Security for clouds and applications
    * DRPS (EASM|BP|ACI)
    * SOC-as-a-Service
    * SIEM
    * SOAR
   
   
   QUICK LINKS
   
    * Gartner Mesh Architecture
    * Security Fabric
    * Products A-Z
 * Small Business
   Complete Protection
   Network Security
   Endpoint Security
   Secure Cloud Applications and Email
 * Service Providers
   Managed Services
   
   MANAGED SERVICES
   
   Expand and grow by providing the right mix of adaptive and cost-effective
   security services
   
   Learn More
   
   
   SOLUTIONS
   
    * MSSP Cybersecurity
    * Managed SD-WAN for Service Providers
    * Managed SOC Service
    * Managed Cloud Security Service
    * Managed WAF Service
   
   
   CASE STUDIES
   
    * Orange Business Services
    * GTT Communications
    * Spark NZ
    * See All
   
   
   QUICK LINKS
   
    * Products A-Z
    * Resource Center
    * Request a Quote
   
   Communications Service Providers
   
   COMMUNICATION SERVICE PROVIDER
   
   Expand and grow by providing the right mix of adaptive and cost-effective
   security services
   
   Learn more
   
   
   SOLUTIONS
   
    * Overview
    * Headquarters Network Security
    * PCI Compliance
    * Secure Networking
    * ATP
    * Adaptive Cloud Security
   
   
   QUICK LINKS
   
    * Products A-Z
    * Resource Center
    * Request a Quote
   
   
   Mobile Provider
   
   MOBILE PROVIDER
   
   Protect your 4G and 5G public and private infrastructure and services.
   Monetize security via managed services on top of 4G and 5G.
   
   Learn More
   
   
   SOLUTIONS
   
    * Network Security
    * SD-WAN & Network Access
    * Cloud & Application Security
    * Security Operations
   
   
   MOBILITY USE CASES
   
    * Security for 4G and 5G Networks and Services
    * Radio Access Network Security
    * Security for Private 5G Mobile Networks
    * Securing the Mobile IoT Ecosystem
    * Security for the Telco Cloud
   
   
   QUICK LINKS
   
    * Products A-Z
    * Resource Center
    * Request a Quote
   
   Contact Us
 * Partners
   Technology Alliances
   
   
   FOR TECH PARTNERS
   
    * Fabric-Ready Program
    * Join the Ecosystem
   
   
   FOR CUSTOMERS
   
    * Ecosystem Overview
    * Fabric Connectors
   
   
   QUICK LINKS
   
    * Fabric-Ready Partners A-Z
    * Resource Center
    * Request a Quote
   
   Find a Partner
   Become a Partner
   Partner Login

Network Security


NETWORK SECURITY

 * Next-Generation Firewall
 * Intrusion Prevention Systems (IPS)
 * Secure Web Gateway (SWG)


NOC MANAGEMENT

 * Central Management
 * Digital Experience Monitoring


USE CASES

 * Hyperscale Security
 * Internal Segmentation
 * Network Automation


QUICK LINKS

 * Security-Driven Networking Explained
 * Zero Trust Edge
 * Analyst Reports
 * Product Certifications
 * Products A-Z

Enterprise Networking


ENTERPRISE NETWORKING

 * Secure SD-WAN
 * Switching
 * Wireless LAN (WLAN)
 * Network Access Control (NAC)
 * LTE/5G Gateway
 * Artificial Intelligence for IT Operations
 * Secure Work-From-Home


BUSINESS INFRASTRUCTURE

 * Voice and Collaboration
 * Video Surveillance


USE CASES

 * Multi-Cloud SD-WAN
 * Secure SD-Branch
 * Campus Networks
 * Teleworker at Scale
 * Unified Communications


QUICK LINKS

 * Network Operations Explained
 * Analyst Reports
 * Products A-Z

Zero Trust Access


ZTNA

 * Zero Trust Network Access (ZTNA)
 * Fabric & VPN Agent


SASE

 * Cloud-Delivered Security


IDENTITY

 * Identity Access Management (IAM)
 * Identity as-a-Service


USE CASES

 * Teleworking at Scale
 * Control Access & Rights for Every User
 * Work from Anywhere


QUICK LINKS

 * Zero Trust Access Explained
 * FortiClient Download
 * Products A-Z
 * Analyst Reports

Cloud Security


HYBRID CLOUD SECURITY

 * Virtual Network Firewall
 * Denial-of-Service (DDoS) Protection


CLOUD-NATIVE PROTECTION

 * Workload Protection & Cloud Security Posture Management
 * DevSecOps


WEB APPLICATION / API PROTECTION

 * Web Application Firewall
 * Application Delivery and Server Load-Balancing


SAAS SECURITY

 * Email Security
 * Cloud Access Security Broker (CASB)


USE CASES

 * AWS
 * Azure
 * Google Cloud
 * Microsoft 365
 * SAP


QUICK LINKS

 * Cloud Security Explained
 * Analyst Reports
 * Free Trials
 * Products A-Z

Security Operations


SOC ANALYTICS PLATFORMS

 * Analytics & Reporting
 * SIEM
 * SOAR


ENDPOINT SECURITY

 * EDR
 * MDR
 * XDR


MANAGED SOC

 * SOC-as-a-Service


ADVANCE DETECTION & PROTECTION

 * IL Malware Analysis
 * NDR
 * Deception Systems
 * DRPS (EASM|BP|ACI)


USE CASES

 * Insider Risk
 * Security Automation
 * Ransomware Protection
 * Phishing Protection
 * Platform Consolidation
 * Risk and Compliance


QUICK LINKS

 * Security Operations Explained
 * FortiGuard Labs
 * Independent Testing
 * Analyst Reports
 * Products A-Z

Threat Intel & Response


FORTIGUARD AI-POWERED SECURITY

 * FortiGuard Security Portfolio
 * Content Security: AV, IL-Sandbox, credentials
 * Web Security: URL, DNS, Video
 * Device Security: IPS, IoT, OT, botnet/C2


FORTIGUARD REAL TIME THREAT INTELLIGENCE

 * FortiGuard Labs Research


INCIDENT RESPONSE (IR)

 * Incident Response
 * Zero Days & Outbreak Alerts


SECURITY ASSESSMENTS & READINESS

 * Security Assessments & Readiness
 * IRR, Playbooks & Tabletop
 * Security & Brand Assessments
 * Cybersecurity Prof Education
 * Security Awareness & Training


USE CASES

 * Security for the network
 * Security for clouds and applications
 * DRPS (EASM|BP|ACI)
 * SOC-as-a-Service
 * SIEM
 * SOAR


QUICK LINKS

 * Gartner Mesh Architecture
 * Security Fabric
 * Products A-Z

 * Enterprise
   Network Security
   
   
   NETWORK SECURITY
   
   * Next-Generation Firewall
   * Intrusion Prevention Systems (IPS)
   * Secure Web Gateway (SWG)
   
   
   NOC MANAGEMENT
   
   * Central Management
   * Digital Experience Monitoring
   
   
   USE CASES
   
   * Hyperscale Security
   * Internal Segmentation
   * Network Automation
   
   
   QUICK LINKS
   
   * Security-Driven Networking Explained
   * Zero Trust Edge
   * Analyst Reports
   * Product Certifications
   * Products A-Z
   Enterprise Networking
   
   
   ENTERPRISE NETWORKING
   
   * Secure SD-WAN
   * Switching
   * Wireless LAN (WLAN)
   * Network Access Control (NAC)
   * LTE/5G Gateway
   * Artificial Intelligence for IT Operations
   * Secure Work-From-Home
   
   
   BUSINESS INFRASTRUCTURE
   
   * Voice and Collaboration
   * Video Surveillance
   
   
   USE CASES
   
   * Multi-Cloud SD-WAN
   * Secure SD-Branch
   * Campus Networks
   * Teleworker at Scale
   * Unified Communications
   
   
   QUICK LINKS
   
   * Network Operations Explained
   * Analyst Reports
   * Products A-Z
   Zero Trust Access
   
   
   ZTNA
   
   * Zero Trust Network Access (ZTNA)
   * Fabric & VPN Agent
   
   
   SASE
   
   * Cloud-Delivered Security
   
   
   IDENTITY
   
   * Identity Access Management (IAM)
   * Identity as-a-Service
   
   
   USE CASES
   
   * Teleworking at Scale
   * Control Access & Rights for Every User
   * Work from Anywhere
   
   
   QUICK LINKS
   
   * Zero Trust Access Explained
   * FortiClient Download
   * Products A-Z
   * Analyst Reports
   Cloud Security
   
   
   HYBRID CLOUD SECURITY
   
   * Virtual Network Firewall
   * Denial-of-Service (DDoS) Protection
   
   
   CLOUD-NATIVE PROTECTION
   
   * Workload Protection & Cloud Security Posture Management
   * DevSecOps
   
   
   WEB APPLICATION / API PROTECTION
   
   * Web Application Firewall
   * Application Delivery and Server Load-Balancing
   
   
   SAAS SECURITY
   
   * Email Security
   * Cloud Access Security Broker (CASB)
   
   
   USE CASES
   
   * AWS
   * Azure
   * Google Cloud
   * Microsoft 365
   * SAP
   
   
   QUICK LINKS
   
   * Cloud Security Explained
   * Analyst Reports
   * Free Trials
   * Products A-Z
   Security Operations
   
   
   SOC ANALYTICS PLATFORMS
   
   * Analytics & Reporting
   * SIEM
   * SOAR
   
   
   ENDPOINT SECURITY
   
   * EDR
   * MDR
   * XDR
   
   
   MANAGED SOC
   
   * SOC-as-a-Service
   
   
   ADVANCE DETECTION & PROTECTION
   
   * IL Malware Analysis
   * NDR
   * Deception Systems
   * DRPS (EASM|BP|ACI)
   
   
   USE CASES
   
   * Insider Risk
   * Security Automation
   * Ransomware Protection
   * Phishing Protection
   * Platform Consolidation
   * Risk and Compliance
   
   
   QUICK LINKS
   
   * Security Operations Explained
   * FortiGuard Labs
   * Independent Testing
   * Analyst Reports
   * Products A-Z
   Threat Intel & Response
   
   
   FORTIGUARD AI-POWERED SECURITY
   
   * FortiGuard Security Portfolio
   * Content Security: AV, IL-Sandbox, credentials
   * Web Security: URL, DNS, Video
   * Device Security: IPS, IoT, OT, botnet/C2
   
   
   FORTIGUARD REAL TIME THREAT INTELLIGENCE
   
   * FortiGuard Labs Research
   
   
   INCIDENT RESPONSE (IR)
   
   * Incident Response
   * Zero Days & Outbreak Alerts
   
   
   SECURITY ASSESSMENTS & READINESS
   
   * Security Assessments & Readiness
   * IRR, Playbooks & Tabletop
   * Security & Brand Assessments
   * Cybersecurity Prof Education
   * Security Awareness & Training
   
   
   USE CASES
   
   * Security for the network
   * Security for clouds and applications
   * DRPS (EASM|BP|ACI)
   * SOC-as-a-Service
   * SIEM
   * SOAR
   
   
   QUICK LINKS
   
   * Gartner Mesh Architecture
   * Security Fabric
   * Products A-Z
 * Small Business
   Complete Protection
   Network Security
   Endpoint Security
   Secure Cloud Applications and Email
 * Service Providers
   Managed Services
   
   Expand and grow by providing the right mix of adaptive and cost-effective
   security services
   
   Learn More
   
   
   SOLUTIONS
   
   * MSSP Cybersecurity
   * Managed SD-WAN for Service Providers
   * Managed SOC Service
   * Managed Cloud Security Service
   * Managed WAF Service
   
   
   CASE STUDIES
   
   * Orange Business Services
   * GTT Communications
   * Spark NZ
   * See All
   
   
   QUICK LINKS
   
   * Products A-Z
   * Resource Center
   * Request a Quote
   Communications Service Providers
   
   Expand and grow by providing the right mix of adaptive and cost-effective
   security services
   
   Learn more
   
   
   SOLUTIONS
   
   * Overview
   * Headquarters Network Security
   * PCI Compliance
   * Secure Networking
   * ATP
   * Adaptive Cloud Security
   
   
   QUICK LINKS
   
   * Products A-Z
   * Resource Center
   * Request a Quote
   Mobile Provider
   
   Protect your 4G and 5G public and private infrastructure and services.
   Monetize security via managed services on top of 4G and 5G.
   
   Learn More
   
   
   SOLUTIONS
   
   * Network Security
   * SD-WAN & Network Access
   * Cloud & Application Security
   * Security Operations
   
   
   MOBILITY USE CASES
   
   * Security for 4G and 5G Networks and Services
   * Radio Access Network Security
   * Security for Private 5G Mobile Networks
   * Securing the Mobile IoT Ecosystem
   * Security for the Telco Cloud
   
   
   QUICK LINKS
   
   * Products A-Z
   * Resource Center
   * Request a Quote
   Contact Us
 * Partners
   Technology Alliances
   
   
   FOR TECH PARTNERS
   
   * Fabric-Ready Program
   * Join the Ecosystem
   
   
   FOR CUSTOMERS
   
   * Ecosystem Overview
   * Fabric Connectors
   
   
   QUICK LINKS
   
   * Fabric-Ready Partners A-Z
   * Resource Center
   * Request a Quote
   Find a Partner
   Become a Partner
   Partner Login

Cyber Readiness Center and Breaking Threat Intelligence: Click here to get the
latest recommendations and Threat Research


PRIVACY POLICY




FORTINET PRIVACY POLICY


EFFECTIVE DATE: FEBRUARY 1, 2022

This is the Privacy Policy of Fortinet, Inc. and its wholly-owned subsidiaries
(collectively, “Fortinet,” “we,” “our,” or “us”). We provide security solutions
that help protect the data and systems of our business customers from
continually evolving risks. It is Fortinet’s policy to provide security and
privacy. Each is important, and they are sometimes co-dependent. We believe in
Security by Design and Privacy by Design. This Privacy Policy covers Fortinet’s
handling of two categories of information:

 * Personal data that our partners and customers ask us to process on their
   behalf (“Processor Data”). Fortinet offers security products and services,
   and related support and professional services (the “Fortinet Services”),
   including FortiGuard, FortiCare, FortiCloud, FortiSandbox Cloud, and
   FortiMail Cloud. With some exceptions as identified below, under applicable
   law, in certain contexts Fortinet is considered the “processor” of the
   personal data we receive through the Fortinet Services, and our customer is
   (or acts on behalf of) the “controller” of the data (i.e., the company with
   the right to decide how the data is used).
 * Personal data that we handle for our own business (“Controller Data”), other
   than for our human resources and recruiting operations. Under applicable law,
   Fortinet is a “controller” of this data. 

This Privacy Policy includes details specific to Processor Data, details
specific to Controller Data, and information relevant to our handling of both
kinds of data. 

1.   Privacy Practices Specific to Processor Data

a. Types of Processor Data We Collect

We receive information from or on behalf of our customers and their users, and
for most of such data, we act as a “processor.”  Because of the nature of the
Fortinet Services, this information may contain any type of personal data. For
example, we may collect the following categories of information, that may be
Processor Data, through the Fortinet Services:

 * Device identifiers, such as IP addresses, device name, model, manufacturer,
   firmware versions, operating system, metadata, time zone, language, MAC
   addresses, and other information about computing systems, applications,
   filenames and file paths, usernames, and technical data about the operating
   system instructions flow and networks.
 * Contact details and registration information (including identifiers), such as
   names, aliases, usernames, emails, age, gender, phone numbers, addresses, and
   photographs
 * Internet or other electronic network or device activity information, such as
   system logs, traffic, URLs, metadata, and antivirus and other malware
   statistics
 * Other information that identifies or can be reasonably associated with you,
   including information contained in files, activity logs, analysis reports,
   communications content and metadata, distribution lists, and information
   provided to us through dashboards or portals associated with the security and
   firewall solutions of the Fortinet Services, such as troubleshooting requests
   and security inquiries regarding files, systems.

Some of the technical information listed above is considered personal data in
certain contexts. Fortinet also collects Processor Data through the technology
described in the “Cookies and Similar Automated Data Collection” section below.
We use Processor Data as described in the following section.

b. Uses of Processor Data

Subject to our contractual obligations, and depending on the particular Fortinet
Services, we may use and disclose the information described above (sometimes in
combination with other information we obtain, such as from our customers) as
follows:

 * To provide the Fortinet Services, including by:
   * Providing maintenance and technical support
   * Providing product upgrades
   * Addressing security and business continuity issues
   * Analyzing and improving the Fortinet Services, including responding to new
     threats and developing new features
 * To enforce the legal terms that govern the Fortinet Services
 * To comply with law and protect rights, safety, and property
 * For other purposes requested or permitted by our customers or users, or as
   reasonably required to perform our business.

Many Fortinet Services use automated technology to recognize and defend against
cybersecurity risks, such as by blocking or quarantining suspected malicious
data. To better protect our customers and assist them with their own security
compliance, some Fortinet Services use external threat information gathered in
these situations to improve security for customers of Fortinet Services in
similar situations. For example, if certain Fortinet services determine that a
hacker is attacking some of our customers, we may use information about that
threat in order to help protect other customers from similar attacks. This
provides our customers’ data with much better protection than what would be
possible if our services could not learn from experience. We handle “Threat
Data” like this as described in the “Privacy Practices Specific to Controller
Data” section below. 

c. Disclosures of Processor Data

Subject to our contractual obligations, and depending on the particular Fortinet
Services, we may disclose the information described above as follows:

 * To provide the Fortinet Services, which can involve sharing personal data
   with our customer and with third parties selected by the customer or its
   users (for example, to detect security incidents, and protect against
   malicious, deceptive, fraudulent, or illegal activity, we process data about
   third-party threat actors such as the IP address of certain hacker-controlled
   devices that attempt cyberattacks on our customers)
 * To enforce the legal terms that govern the Fortinet Services
 * To comply with law, and where we deem disclosure appropriate to protect
   rights, safety and property (for example, for national security or law
   enforcement)
 * As part of an actual or contemplated business sale, merger, consolidation,
   change in control, transfer of substantial assets or reorganization
 * For other purposes requested or permitted by our customers or users, or as
   reasonably required to perform our business

For those purposes, we may share information with our affiliates and other
entities that help us with the activities described in this Privacy Policy.

2. Privacy Practices Specific to Controller Data

a. Types of Controller Data We Collect

As described above, we act as a processor for most of the Fortinet Services. We
are, however, a “controller” under applicable law with respect to Controller
Data. Controller Data includes two general categories of data: Business Data and
Threat Data.


For example, we may collect certain data about customers, prospective customers,
partners and their personnel (“Business Data”), which may include:

 * Contact details and professional details, such as name, email address,
   address, phone number, title and name of company
 * Online identifiers, such as IP address and account ID information
 * Information about users’ experience with our products, services, events and
   online forums and communities, such as the Fortinet Developer Network and
   CTAP end-user reports.
 * Information about actual or prospective customer personnel’s other
   interactions with Fortinet, e.g., procurement, customer service, and point of
   sale data
 * Data we handle in connection with the Network Security Expert Institute, the
   Fortinet Network Security Academy and other training and certification
   programs, including contact information, identity documents and other
   personal data collected for authentication of the candidate’s identity and
   test security, and testing results.
 * Audio or video information, such recordings of meetings, or photographs
   collected from certification candidates for identity verification and
   security checks
 * Information about actual or prospective users’ interests
 * Financial data, such as payment information for Fortinet products and
   services
 * Investor relations-related data
 * Other business-related data collected on our websites (such as online forum
   registrations) and elsewhere for our own business (such as at events)

We obtain Business Data directly from the relevant individuals or their
employers, and also from third-party sources, such as distributors, resellers
and partners, credit card issuers, clearinghouses, data brokers, fraud
databases, referrals from customers and users, as well as publicly available
sources such as company websites.

In connection with some Fortinet Services, Fortinet is also considered a
controller of certain personal data relevant to security threats, i.e. “Threat
Data.”  To the extent it is personal data, IP addresses, device identifiers,
URLs, and other data associated with malicious activity are part of Threat
Data. We obtain Threat Data through Fortinet Services, publicly available
sources such as online forums, other security providers and researchers, and
independent research.

Fortinet also collects Business Data and Threat Data through the technology
described in the Cookies and Similar Automated Data Collection section below. We
use all Controller Data as described in the following section. 

b. Uses of Controller Data (Business Data and Threat Data)

Fortinet uses Controller Data as follows:

 * To provide our products, services, events, websites, communities, training,
   certifications, and other business offerings
 * For marketing, advertising, and other communications (including customizing
   and tailoring all of them for the particular recipient)
 * To manage our relationships with customers, partners, suppliers, event
   attendees, and others
 * For surveys and other market research
 * For cybersecurity research
 * To analyze, improve, and create Fortinet Services and other business
   offerings
 * To enforce the legal terms that govern our business and online properties
 * To provide security and business continuity
 * To comply with law and protect rights, safety, and property
 * For other purposes requested or permitted by our customers or users, or as
   reasonably required to perform our business.

c. Disclosures of Controller Data (Business Data and Threat Data)

Subject to our contractual obligations, we share the information described above
as follows:

 * For the uses of information described above
 * As part of an actual or contemplated business sale, merger, consolidation,
   change in control, transfer of substantial assets or reorganization
 * For other purposes requested or permitted by our customers or users, or as
   reasonably required to perform our business.

For those purposes, we may share information with our affiliates and other
entities that help us with the activities described in this Privacy Policy.

d. Legal Bases for Processing Controller Data (Business Data and Threat Data)

The laws in some jurisdictions require companies to tell you about the legal
ground they rely on to use or disclose your personal data. To the extent those
laws apply, our legal grounds for processing Controller Data are as follows:

 * Legitimate interests: In most cases, we handle personal data on the ground
   that it furthers our legitimate interests in commercial activities such as
   the following in ways that are not overridden by the interests or fundamental
   rights and freedoms of the affected individuals:
   * Protecting our business, personnel and property
   * Providing cybersecurity, including for the protection of personal data
   * Customer service
   * Marketing
   * Analyzing and improving our business; and/or
   * Managing legal issues

We may also process personal data for the same legitimate interests of our
customers and business partners.

 * To honor our contractual commitments to the individual:  Some of our
   processing of personal data is to meet our contractual obligations to
   individuals, or to take steps at the individuals’ request in anticipation of
   entering into a contract with them.
 * Consent: Where required by law, and in some other cases, we handle personal
   data on the basis of consent. Where legally required (e.g., for the use of
   fingerprints for security purposes in certain jurisdictions), this is
   explicit consent.
 * Legal compliance: We need to use and disclose personal data in certain ways
   to comply with our legal obligations.

3. Additional Information About Our Privacy Practices (applicable to both
Processor Data and Controller Data)

a. Personal Data Rights and Choices (including Direct Marketing Opt-Out)

We offer the options described below for exercising rights and choices under
applicable law.  Many of these are subject to important limits or exceptions
under applicable law.

 * To exercise rights or choices with respect to Processor Data, please make
   your request directly to the Fortinet customer for whom we process the data,
   particularly if the self-service options described below do not fully resolve
   your concern. 
 * You may review and update certain user information by logging in to the
   relevant portions of the Fortinet Services or Fortinet websites or online
   services.

In addition, the law of your jurisdiction (for example, within the European
Economic Area) may give you additional rights to request access to and
rectification or erasure of certain of your personal data we hold.  In some
cases, you may be entitled to receive a copy of the personal data you provided
to us in portable form or to request that we transmit it to a third party.  The
law may also give you the right to request restrictions on the processing of
your personal data, to object to processing of your personal data, or to
withdraw consent for the processing of your personal data (which will not affect
the legality of any processing that happened before your request takes effect).

You may contact us as described below to make these requests.

 * For example, residents of the European Economic Area and certain other
   jurisdictions have a right to opt out of our processing of Controller Data
   for direct marketing purposes.  You can exercise this right by contacting us
   as described below.
 * Our marketing emails and certain other communications include unsubscribe
   instructions, which you can use to limit or stop the relevant
   communications.  Opt-out processes may take some time to complete, consistent
   with applicable law.  Certain communications (such as certain billing-related
   communications or emergency service messages) are not subject to opt-out.
 * Many Fortinet Services are designed to block hacking and other unauthorized
   activity, and they use automated means to compare user activity or device
   traits to similar data points that been associated with hacking or other
   unauthorized activity.  If you believe that our services have been used to
   block you in error, please contact the relevant Fortinet customer for
   assistance.  If you believe our services have blocked access to certain
   websites in error, please follow the instructions on our FortiGuard website
   to have such blocking reviewed.  In limited cases, we may be able to assist
   you directly, depending on our contract with our customer and how the
   blocking happened.
 * You may contact us with any concern or complaint regarding our privacy
   practices, and you also may lodge a complaint with the relevant governmental
   authority.
 * Some Residents of California and Nevada have specific rights under the next
   two sections.

b. Notice of Privacy Rights for California Residents

Except where expressly noted, the subsections below apply only to “personal
information” about California residents, as that term is defined in the
California Consumer Privacy Act (“CCPA”), and they supplement the information in
the rest of our Privacy Notice above. Data about individuals who are not
residents of California is handled differently and is not subject to the same
rights described below. Californians who wish to exercise the rights described
here with respect to Processor Data should contact the customer on whose behalf
we handle the data.  The rest of this California section applies only to
Controller Data.

Categories of personal information we collect and disclose

During the 12 months leading up to the effective date of this Privacy Notice,
Fortinet has collected all of the information described in Section 2(a) and
Section 3(e) of this Privacy Policy from and about California residents. During
that period, we made the following disclosures of personal information about
Californians for business purposes:

Category of personal information

Categories of third parties to which it is disclosed

Identifiers, such as name, address, email address, IP addresses, and other
contact information.

Fortinet customers; Fortinet business partners; providers of marketing and
advertising services; payment processors; providers of customer/support
services; security researchers and similar partners; and providers of technical
services. 

Commercial information, such as information about an individual’s interests and
interactions with Fortinet or our partners, including transaction data.

Same as first row.

Audio information, such as recordings of meetings, webinars, or virtual events.

Same as first row, except not to payment processors or security researchers.

Visual information, such as photographs collected from certification candidates
for identity verification and test security, or recordings of meetings,
webinars, or virtual events.

Same as first row, except not to payment processors or security researchers.

Geolocation information, such as the location of your device (e.g., latitude and
longitude).

Same as first row, except not to payment processors.

Internet or other network or device activity, such as lookup history or a record
of your online Services usage.

Same as first row, except not to payment processors.

Categories of personal information described in California Civil Code Section
1798.80(e).

Same as first row, except not to payment processors.

Other information you provide to us, such as information provided via surveys.

Same as first row.

Inferences based on any of the above.

Same as first row.

We also have shared all of the categories of personal information we collect as
set forth in Section 2(b) and Section 2(c), including with governmental entities
for legal purposes and our affiliates and subsidiaries.

CCPA “sale” of California personal information

Fortinet does not sell personal information as the term “sell” is traditionally
understood. But “sell” under the CCPA is broadly defined. It includes the
sharing of personal information with third parties in exchange for something of
value, even if no money changes hands. For example, sharing an advertising or
device identifier with a third party to receive their services may be considered
a “sale” under the CCPA in some cases. During the 12 months leading up to the
effective date of this Privacy Policy, we have “sold” what the CCPA calls
“identifiers” (like IP addresses), “internet or other electronic network
activity information” (like information regarding an individual’s browsing
interactions on Fortinet.com), and “commercial information” (like the fact that
a browser visited a page directed to people who are considering purchasing from
us) to marketing and advertising services. This practice continues today.

Californians have a right to ask us not to “sell” certain personal information
as that term is defined in under the CCPA.  You can make such a request by
performing BOTH of the following steps: 

 1. Complete our Form located in “Contact Us” below and include the phrase “Do
    Not Sell My Personal Information” in the form fields (or just send us an
    email at privacy@fortinet.com with that request); AND
 2. If you’d like your request to include CCPA “sales” that happen through
    cookies and related technology, follow the steps below that are applicable
    to your use of our websites: 

 * To opt out of those “sales” that occur through webpages with a URL that
   begins with “www.fortinet.com”, click on the Cookie Preferences link in the
   footer.  In the consent preference manager that pops up, click on the
   Performance Cookies tab and make sure the toggle button is in the off
   position (the left side of the slider).  Click it if it is not in the off
   position.  Repeat this process for Advertising Cookies and Functional Cookies
   and then click the “Confirm My Choices” button.  Be sure to repeat this
   second step from each browser you use to access our webpages that begin with
   “www.fortinet.com.”  You’ll need to repeat this process again in a particular
   browser if you clear your cookies in that browser.
 * Additional control options (which can be used to limit certain data
   collection or use on Fortinet webpages that don't have a Cookie Preferences
   link in their footer) are described in the Cookies and Similar Automated Data
   Collection section of our Privacy Policy below.

We reserve the right to take reasonable steps to verify the validity of your
requests.

How we use these categories of personal information

We and our service providers may use the categories of information we collect
from and about you for the purposes described in Section 2 and Section 3(e).

Additional CCPA privacy rights

If you are a California resident, California law may permit you to request that
we:

 * Provide you the categories of personal information we have collected or
   disclosed about you in the last twelve months; the categories of sources of
   such information; the business or commercial purpose for collecting or
   selling your personal information; and the categories of third parties with
   whom we shared personal information.
 * Provide access to and/or a copy of certain information we hold about you.
 * Delete certain information we have about you.

Certain information may be exempt from such requests under applicable law.  For
example, the CCPA has significant exemptions for certain B2B data. You also may
have the right to receive information about the financial incentives that we
offer to you (if any). You also have certain rights under the CCPA not to be
subject to certain negative consequences for exercising CCPA rights.

To request to exercise any of these rights and receive the fastest response,
please email us at privacy@fortinet.com or submit a request through the form
located at the bottom of this policy under “Contact Us.” We reserve the right to
require verification of your identify before we fulfill a request, which may
include requiring you to login to an existing Fortinet account, providing us
with information that matches our records for you, responding to an email we
send, or taking other steps relevant to your relationship with us and the nature
of your request.

If you are an agent making a request on behalf of a consumer, we reserve the
right to take steps to verify that you are authorized to make that request,
which may include requiring you to provide us with written proof such as a
notarized authentication letter or a power of attorney.  We also may require the
consumer to verify their identity directly with us.  Because opt-out requests
for sales made through cookies and related technology must be performed from
each browser that is used to access our Services, it is easiest for the consumer
to perform such opt-outs themselves.  However, if a consumer wishes for an agent
to perform browser-based requests on their behalf, the consumer may arrange for
the agent to use the consumer’s browser to make such requests.  We are not
responsible for the security risks of this or any other arrangements that a
consumer may have with an agent.  For clarity, this is not permission for any
user to share their login credentials with an agent or any third party.  Such
sharing is prohibited and is not required for an agent to make requests under
this Privacy Policy.

For security and legal reasons, however, Fortinet reserves the right not to
accept requests that require us to access third-party websites or services.

c. Notice to Nevada Residents

 * Under a Nevada law, certain Nevada consumers may opt out of the “sale” of
   “personally identifiable information” for monetary consideration to a person
   for that person to license or sell such information to additional persons, as
   those concepts are defined under the Nevada law, which differs from the CCPA.
   “Personally identifiable information” under that law includes first and last
   name, address, email address, phone number, Social Security Number, or an
   identifier that allows a specific person to be contacted either physically or
   online.
 * We do not engage in such activity; however, if you are a Nevada resident who
   has purchased or leased goods or services from us, you may submit a request
   to opt out of any potential future sales under Nevada law by contacting
   privacy@fortinet.com.   We reserve the right to take reasonable steps to
   verify your identity and the authenticity of the request.  Once verified, we
   will maintain your request in the event our practices change.

d. Aggregate or De-Identified Data

Subject to applicable law and our contractual obligations, (i) we may aggregate
or de-identify Controller Data or Processor Data so that the information cannot
be linked to the relevant individual and (ii) our use and disclosure of
aggregated, anonymized, and other non-personal information is not subject to any
restrictions under this Privacy Policy, and we may disclose it to others without
limitation for any purpose.

e. Cookies and Similar Automated Data Collection

In our websites, apps and emails, we and third parties may collect certain
information by automated means such as cookies, Web beacons, tags and scripts or
similar technologies, JavaScript and mobile device functionality. This
information may include unique browser identifiers, IP address, browser and
operating system information, device identifiers (such as the Apple IDFA or
Android Advertising ID), geolocation, other device information, Internet
connection information, as well as details about individuals’ interactions with
our apps, websites and emails (for example, the URL of the third-party website
from which you came, the pages on our website that you visit, and the links you
click on in our websites).

We and third parties may use automated means to read or write information on
users’ devices, such as in various types of cookies and other browser-based or
plugin-based local storage (such as HTML5 storage or Flash-based storage).

Cookies and local storage are files that contain data, such as unique
identifiers, that we or a third party may transfer to or read from a user’s
device for the purposes described in this Privacy Policy, such as recognizing
the device, service provision, record-keeping, analytics and marketing,
depending on the context of collection.

These technologies help us (a) keep track of whether you are signed in or have
previously signed in so that we can display all the features that are available
to you; (b) remember your settings on the pages you visit, so that we can
display your preferred content the next time you visit; (c) display personalize
content; (d) perform analytics, and measure traffic and usage trends, and better
understand the demographics of our users; (e) diagnose and fix technology
problems; and (f) otherwise plan for and enhance our business.

Also, in some cases, we facilitate the collection of information by advertising
services administered by third parties. The ad services may track users’ online
activities over time by collecting information through automated means such as
cookies, and they may use this information to show users ads that are tailored
to their individual interests or characteristics and/or based on prior visits to
certain sites or apps, or other information we or they know, infer or have
collected from the users. For example, we and these providers may use different
types of cookies, other automated technology, and data (i) to recognize users
and their devices, (ii) to inform, optimize, and serve ads and (iii) to report
on our ad impressions, other uses of ad services, and interactions with these ad
impressions and ad services (including how they are related to visits to
specific sites or apps).

The best way to manage your preferences regarding our use of these technologies
on Fortinet websites that have a “Cookie Preferences” link in the footer is to
click that link and submit your preferences.  On other Fortinet webpages, you
can make certain choices by following the steps below.

You may be able to set your web browser to refuse certain types of cookies, or
to alert you when certain types of cookies are being sent. Some browsers offer
similar settings for HTML5 local storage, and Flash storage can be managed here.
However, if you block or otherwise reject our cookies, local storage, JavaScript
or other technologies, certain websites (including our own websites) may not
function properly.

To learn more about interest-based advertising generally, including how to opt
out from the targeting of interest-based ads by some of our current ad service
partners, visit aboutads.info/choices or youronlinechoices.eu from each of your
browsers. You can opt out of Google Analytics and customize the Google Display
Network ads by visiting your Google Ads Settings. Google also allows you to
install a Google Analytics Opt-out Browser Add-on for your browser. If you
replace, change or upgrade your browser, or delete your cookies, you may need to
use these opt-out tools again. We do not respond to browser-based do-not-track
signals.

Please visit your mobile device manufacturer's website (or the website for its
operating system) for instructions on any additional privacy controls in your
mobile operating system, such as privacy settings for device identifiers and
geolocation. 

f. International Data Transfers

Fortinet and the recipients of the data disclosures described in this Privacy
Policy have locations in the United States, Canada and elsewhere in the world,
including where privacy laws may not provide as much protection as those of your
country of residence.  Fortinet data centers for Processor Data are located
primarily in Canada.   We comply with legal requirements for cross-border data
protection, including through the use of European Commission-approved Standard
Contractual Clauses.  To exercise any legal right to request data transfer
mechanism documents that Fortinet uses to transfer data to third parties, please
contact us.

Certain Fortinet Services allow our customers and users to make international
data transfers to third parties, for which they are solely responsible.

g. Security

We have put in place physical, electronic, and managerial procedures to
safeguard data and help prevent unauthorized access, to maintain data security,
and to use correctly the data we collect. However, we cannot assure you that
data that we collect will never be used or disclosed in a manner that is
inconsistent with this Privacy Policy.

If a password is used to help protect your personal information, it is your
responsibility to keep the password confidential. Do not share this information
with anyone.

h. Data Retention

We will retain your information for the period necessary to fulfill the purposes
outlined in this Privacy Policy unless a longer retention period is required or
permitted by law. To provide security and business continuity for the activities
described in this Privacy Policy, we make backups of certain data, which we may
retain for longer than the original data. For example, FortiCloud Sandbox will
store logs of suspicious activities for 1 year.

i. Notification of Changes

Fortinet reserves the right to change this Privacy Policy at any time to reflect
changes in the law, our data collection and use practices, the features of our
services, or advances in technology. Please check this page periodically for
changes. Any updated Privacy Policy will be posted on Fortinet.com via a
hyperlink in the footer or other convenient location. 

j. How to Contact Us

To request to exercise any of these rights and receive the fastest response,
please click here or email us at privacy@fortinet.com.

 


CONTACT US TO GET STARTED


LEARN MORE




GET TECHNICAL SUPPORT ASSISTANCE



Products


ENTERPRISE

 * Network Security
 * Cloud Security
 * Security Operations
 * Zero Trust Access
 * Threat Intelligence


SMALL MID-SIZED BUSINESSES

 * Overview


SERVICE PROVIDERS

 * Overview

Partners
 * Overview
 * Alliances Ecosystem
 * Find a Partner
 * Become a Partner
 * Partner Login

Discover More
 * About Us
 * Contact Us
 * Training
 * Resources
 * Support
 * Product Downloads
 * COVID-19 Response
 * CyberGlossary
 * Careers
 * Early Talent Program
 * Investor Relations
 * Social Responsibility
 * Sitemap

Enter Email Address

Subscription Successful!

Request Failed. Please try again later!

I want to receive news and product emails. Read our privacy policy.



Connect With Us
 * Email Preference Center
 * Blog
 * Fortinet Community
 * Fuse Community

 * 
 * 
 * 
 * 
 * 
 * 

Products
Enterprise
 * Network Security
 * Cloud Security
 * Security Operations
 * Zero Trust Access
 * Threat Intelligence

Small Mid-Sized Businesses
 * Overview

Service Providers
 * Overview

Partners
 * Overview
 * Alliances Ecosystem
 * Find a Partner
 * Become a Partner
 * Partner Login

Discover More
 * About Us
 * Contact Us
 * Training
 * Resources
 * Support
 * Product Downloads
 * COVID-19 Response
 * CyberGlossary
 * Careers
 * Early Talent Program
 * Investor Relations
 * Social Responsibility
 * Sitemap

Enter Email Address

Subscription Successful!

Request Failed. Please try again later!

I want to receive news and product emails. Read our privacy policy.



Connect With Us
 * Email Preference Center
 * Blog
 * Fortinet Community
 * Fuse Community



Copyright © 2022 Fortinet, Inc. All Rights Reserved.

 * Terms of Service
 * Privacy Policy
 * Notice for California Residents
 * Do Not Sell My Personal Information
 * GDPR
 * Cookie Settings

©Gartner is a registered trademark and service mark of Gartner, Inc. and/or its
affiliates, and is used herein with permission. All Rights Reserved.

Also of Interest
 * Fortinet Security Fabric
 * Zero-Trust Network Access
 * Products


Request a quoteContact UsFree Demo

×





COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES


YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking certain cookies in the Functional category may impact your
experience of the site and the services we are able to offer. privacy policy


STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.

Cookies Details‎


PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎


FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎


TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They are based on uniquely identifying your
browser and internet device. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎


BACK BUTTON BACK

Vendor Search
Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label


 * 33ACROSS
   
   33ACROSS
   
   View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All



COOKIE SETTINGS

By clicking “Accept All”, you agree to use of cookies on your device to enhance
site functionality, analyze site usage, and assist in our marketing efforts. The
Cookies Settings link has cookie-specific detail and preference options. privacy
policy

Reject All Accept All
Cookies Settings