www.fortinet.com
Open in
urlscan Pro
3.91.211.14
Public Scan
URL:
https://www.fortinet.com/corporate/about-us/legal?elqTrackId=f09323fa86d344b5a6f46566a276c6cb&elq=60468149356d47c8b41df38...
Submission: On October 31 via api from CA — Scanned from CA
Submission: On October 31 via api from CA — Scanned from CA
Form analysis
3 forms found in the DOMGET /search
<form id="sitesearch" action="/search" method="get">
<button aria-label="Search Toggle" aria-expanded="false" aria-controls="search">
<svg id="Layer_search" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 137.82 139.77" width="21" height="21">
<path class="cls-1" d="M120.76,136.84l-37-37L97.86,85.68l37,37a10,10,0,0,1,0,14.13h0A10,10,0,0,1,120.76,136.84Z"></path>
<path class="cls-1" d="M56,112a56,56,0,1,1,56-56A56.08,56.08,0,0,1,56,112Zm0-99A43,43,0,1,0,99,56,43,43,0,0,0,56,13Z"></path>
</svg>
</button>
<label for="search">Search</label>
<input id="search" name="q" type="text" class="hidden" placeholder="Search">
<input type="hidden" name="site" id="site" disabled="" value="https://www.fortinet.com">
</form>
<form class="ftnt-subscribe-form">
<div class="form-control">
<label for="email">Enter Email Address</label>
<input type="email" required="required" id="email" name="emailAddress" placeholder="Enter Email Address">
<button type="submit">
<img src="/content/dam/fortinet/images/icons/submit-arrow.svg" alt="Submit" width="24" height="24">
</button>
</div>
<div role="status" class="ftnt-subscribed" style="margin-bottom: 17px;display:none;color:#da291c;">
<p> Subscription Successful!</p>
</div>
<div class="ftnt-subscription-failed" style="margin-bottom: 17px;display:none;color:#da291c;">
<p> Request Failed. Please try again later!</p>
</div>
<div class="form-checkbox">
<label for="terms">
<input type="checkbox" tabindex="-1" required="required" value="on" name="consentCheckbox" id="terms">
<span tabindex="0" class="checkmark"></span>
</label>
<p></p>
<p>I want to receive news and product emails. Read our <a href="/corporate/about-us/privacy">privacy policy</a>.</p>
<p></p>
</div>
<input type="hidden" name="languagecountry" value="en-us">
<input type="hidden" name="eloquaFormAction" value="https://s3049749.t.eloqua.com/e/f2">
<input type="hidden" name="HFcampaignID" value="7012H000001dWu1QAE">
<input type="hidden" name="HFemailID">
<input type="hidden" name="elqSiteId" value="3049749">
<input type="hidden" name="elqFormId" value="form420">
<input type="hidden" name="elqFormName" value="WebsiteSubscription">
<input type="hidden" name="memberStatus" value="Responded">
<input type="hidden" name="assetName" value="Legal">
<input type="hidden" name="assetUrl" value="https://www.fortinet.com/corporate/about-us/legal">
<input type="hidden" name="last-page-visit" value="">
<input type="hidden" id="formChecker" name="formChecker" value="">
<input type="hidden" id="utmsource" name="utmsource" value="">
<input type="hidden" id="utmmedium" name="utmmedium" value="">
<input type="hidden" id="utmcampaign" name="utmcampaign" value="">
<input type="hidden" id="utmterm" name="utmterm" value="">
<input type="hidden" id="utmcontent" name="utmcontent" value="">
<input type="hidden" name="hiddenField2" value="Website">
<input type="hidden" name="mid" value="47066386979896952263644947150147246251">
<input type="hidden" name="servertype" value="fortinetincproduction">
<input type="hidden" name="languagecode" value="EN">
<input type="hidden" name="country" value="Canada">
</form>
<form class="ftnt-subscribe-form">
<div class="form-control">
<label for="email">Enter Email Address</label>
<input type="email" required="required" id="email" name="emailAddress" placeholder="Enter Email Address">
<button type="submit">
<img src="/content/dam/fortinet/images/icons/submit-arrow.svg" alt="Submit" width="24" height="24">
</button>
</div>
<div role="status" class="ftnt-subscribed" style="margin-bottom: 17px;display:none;color:#da291c;">
<p> Subscription Successful!</p>
</div>
<div class="ftnt-subscription-failed" style="margin-bottom: 17px;display:none;color:#da291c;">
<p> Request Failed. Please try again later!</p>
</div>
<div class="form-checkbox">
<label for="terms">
<input type="checkbox" tabindex="-1" required="required" value="on" name="consentCheckbox" id="terms">
<span tabindex="0" class="checkmark"></span>
</label>
<p></p>
<p>I want to receive news and product emails. Read our <a href="/corporate/about-us/privacy">privacy policy</a>.</p>
<p></p>
</div>
<input type="hidden" name="languagecountry" value="en-us">
<input type="hidden" name="eloquaFormAction" value="https://s3049749.t.eloqua.com/e/f2">
<input type="hidden" name="HFcampaignID" value="7012H000001dWu1QAE">
<input type="hidden" name="HFemailID">
<input type="hidden" name="elqSiteId" value="3049749">
<input type="hidden" name="elqFormId" value="form420">
<input type="hidden" name="elqFormName" value="WebsiteSubscription">
<input type="hidden" name="memberStatus" value="Responded">
<input type="hidden" name="assetName" value="Legal">
<input type="hidden" name="assetUrl" value="https://www.fortinet.com/corporate/about-us/legal">
<input type="hidden" name="last-page-visit" value="">
<input type="hidden" id="formChecker" name="formChecker" value="">
<input type="hidden" id="utmsource" name="utmsource" value="">
<input type="hidden" id="utmmedium" name="utmmedium" value="">
<input type="hidden" id="utmcampaign" name="utmcampaign" value="">
<input type="hidden" id="utmterm" name="utmterm" value="">
<input type="hidden" id="utmcontent" name="utmcontent" value="">
<input type="hidden" name="hiddenField2" value="Website">
<input type="hidden" name="mid" value="47066386979896952263644947150147246251">
<input type="hidden" name="servertype" value="fortinetincproduction">
<input type="hidden" name="languagecode" value="EN">
<input type="hidden" name="country" value="Canada">
</form>
Text Content
Skip to content Skip to navigation Skip to footer Skip to content Cyber Readiness Center and Breaking Threat Intelligence: Click here to get the latest recommendations and Threat Research * Free Product Demo * Discover More CORPORATE * About Us * Executive Management * Public Sector Advisory Council * Contact Us * Careers * Early Talent Program * Social Responsibility * Investor Relations * Newsroom * Executive Briefing Centers TRAINING * Training Institute * Certification Program * Authorized Training Centers * Security Awareness Training * Education Outreach Program * Academic Partner Program * Veterans Program * Free Training & On-Demand Labs * Login to NSE Platform RESOURCES * Resource Center * Blog * CyberGlossary * Product Certifications * Customer Stories * Fortinet Icon Library * Events & Webinars * Fuse Community * Analyst Reports * Video Library * Ordering Guides * Fortinet Contracts & Grants * SUPPORT Experienced a Breach? FortiCare Support Services Product Demo Center Product Downloads Product Registration Documents Library Fortinet Community Contact Support FortiAnswers * Services * Support * Login to FortiCloud username * Search * * USA (English) * Germany (Deutsch) * France (Français) * Italy (Italiano) * Russia (Русский) * Japan (日本語) * Korea (한국어) * China (简体中文) * Taiwan (繁體中文) * Brazil (Portugués) * Latin America (Español) * * Enterprise Network Security NETWORK SECURITY * Next-Generation Firewall * Secure Access Service Edge (SASE) * Intrusion Prevention Systems (IPS) * Secure Web Gateway (SWG) NOC MANAGEMENT * Central Management * Digital Experience Monitoring USE CASES * Hyperscale Security * Internal Segmentation * Network Automation QUICK LINKS * Security-Driven Networking Explained * Zero Trust Edge * Product Certifications * Products A-Z * Analyst Reports Enterprise Networking WAN * Secure SD-WAN * LTE/5G Gateway LAN * Switching * Wireless LAN (WLAN) * Network Access Control (NAC) WORK FROM HOME * Secure Work-From-Home NOC MANAGEMENT * Central Management * Artificial Intelligence for IT Operations * Digital Experience Monitoring * Cloud-Based LAN Management COMMUNICATIONS AND SURVEILLANCE * Voice and Collaboration * Video Surveillance USE CASES * Multi-Cloud SD-WAN * Secure SD-Branch * SD-Campus * Teleworker at Scale * Unified Communications QUICK LINKS * Network Operations Explained * Products A-Z * Analyst Reports Zero Trust Access ZTNA * Zero Trust Network Access (ZTNA) * Fabric & VPN Agent IDENTITY * Identity Access Management (IAM) * Identity as-a-Service USE CASES * Teleworking at Scale * Control Access & Rights for Every User * Work from Anywhere QUICK LINKS * Zero Trust Access Explained * FortiClient Download * Products A-Z * Analyst Reports Cloud Security HYBRID CLOUD SECURITY * Virtual Network Firewall * Denial-of-Service (DDoS) Protection CLOUD-NATIVE PROTECTION * Workload Protection & Cloud Security Posture Management * DevSecOps WEB APPLICATION / API PROTECTION * Web Application Firewall * Application Delivery and Server Load-Balancing SAAS SECURITY * Email Security USE CASES * AWS * Azure * Google Cloud * Microsoft 365 * SAP QUICK LINKS * Cloud Security Explained * Free Trials * Products A-Z * Analyst Reports Security Operations SOC ANALYTICS PLATFORMS * Analytics & Reporting * SIEM * SOAR ENDPOINT SECURITY * EDR * MDR * XDR MANAGED SOC * SOC-as-a-Service ADVANCED DETECTION & PROTECTION * Inline Sandbox Solutions * NDR * Deception Systems * DRPS (EASM|BP|ACI) USE CASES * Insider Risk * Security Automation * Ransomware Protection * Phishing Protection * Platform Consolidation * Risk and Compliance QUICK LINKS * Security Operations Explained * FortiGuard Labs * Independent Testing * Products A-Z * Analyst Reports Cybersecurity Services CYBERSECURITY SUBSCRIPTIONS * FortiGuard Security Portfolio * Content Security: AV, IL-Sandbox, credentials * Web Security: URL, DNS, Video * Device Security: IPS, IoT, OT, botnet/C2 * Inline CASB Service FORTIGUARD REAL TIME THREAT INTELLIGENCE * FortiGuard Labs Research INCIDENT RESPONSE (IR) * Incident Response * Zero Days & Outbreak Alerts SECURITY PS SERVICES * Security Assessments & Readiness * Incident Readiness & Response FORTIOS INNOVATION * FortiOS USE CASES * DRPS (EASM|BP|ACI) * SOC-as-a-Service * SIEM * SOAR * Inline Sandbox Solutions * Ransomware Protection QUICK LINKS * Gartner Mesh Architecture * Security Fabric * Products A-Z * Analyst Reports Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports * Small Business Complete Protection Network Security Endpoint Security Secure Cloud Applications and Email Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports * Service Providers Managed Services MANAGED SERVICES Expand and grow by providing the right mix of adaptive and cost-effective security services Learn More SOLUTIONS * MSSP Cybersecurity * Managed SD-WAN for Service Providers * Managed SOC Service * Managed Cloud Security Service * Managed WAF Service CASE STUDIES * Orange Business Services * GTT Communications * Spark NZ * See All QUICK LINKS * Products A-Z * Resource Center * Request a Quote Communications Service Providers COMMUNICATION SERVICE PROVIDER Expand and grow by providing the right mix of adaptive and cost-effective security services Learn more SOLUTIONS * Overview * Headquarters Network Security * PCI Compliance * Secure Networking * ATP * Adaptive Cloud Security QUICK LINKS * Products A-Z * Resource Center * Request a Quote Mobile Provider MOBILE PROVIDER Protect your 4G and 5G public and private infrastructure and services. Monetize security via managed services on top of 4G and 5G. Learn More SOLUTIONS * Network Security * SD-WAN & Network Access * Cloud & Application Security * Security Operations MOBILITY USE CASES * Security for 4G and 5G Networks and Services * Radio Access Network Security * Security for Private 5G Mobile Networks * Securing the Mobile IoT Ecosystem * Security for the Telco Cloud QUICK LINKS * Products A-Z * Resource Center * Request a Quote Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports Contact Us * Partners Technology Alliances FOR TECH PARTNERS * Fabric-Ready Program * Join the Ecosystem FOR CUSTOMERS * Ecosystem Overview * Fabric Connectors QUICK LINKS * Fabric-Ready Partners A-Z * Resource Center * Request a Quote Find a Partner Become a Partner Partner Login Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports Network Security NETWORK SECURITY * Next-Generation Firewall * Secure Access Service Edge (SASE) * Intrusion Prevention Systems (IPS) * Secure Web Gateway (SWG) NOC MANAGEMENT * Central Management * Digital Experience Monitoring USE CASES * Hyperscale Security * Internal Segmentation * Network Automation QUICK LINKS * Security-Driven Networking Explained * Zero Trust Edge * Product Certifications * Products A-Z * Analyst Reports Enterprise Networking WAN * Secure SD-WAN * LTE/5G Gateway LAN * Switching * Wireless LAN (WLAN) * Network Access Control (NAC) WORK FROM HOME * Secure Work-From-Home NOC MANAGEMENT * Central Management * Artificial Intelligence for IT Operations * Digital Experience Monitoring * Cloud-Based LAN Management COMMUNICATIONS AND SURVEILLANCE * Voice and Collaboration * Video Surveillance USE CASES * Multi-Cloud SD-WAN * Secure SD-Branch * SD-Campus * Teleworker at Scale * Unified Communications QUICK LINKS * Network Operations Explained * Products A-Z * Analyst Reports Zero Trust Access ZTNA * Zero Trust Network Access (ZTNA) * Fabric & VPN Agent IDENTITY * Identity Access Management (IAM) * Identity as-a-Service USE CASES * Teleworking at Scale * Control Access & Rights for Every User * Work from Anywhere QUICK LINKS * Zero Trust Access Explained * FortiClient Download * Products A-Z * Analyst Reports Cloud Security HYBRID CLOUD SECURITY * Virtual Network Firewall * Denial-of-Service (DDoS) Protection CLOUD-NATIVE PROTECTION * Workload Protection & Cloud Security Posture Management * DevSecOps WEB APPLICATION / API PROTECTION * Web Application Firewall * Application Delivery and Server Load-Balancing SAAS SECURITY * Email Security USE CASES * AWS * Azure * Google Cloud * Microsoft 365 * SAP QUICK LINKS * Cloud Security Explained * Free Trials * Products A-Z * Analyst Reports Security Operations SOC ANALYTICS PLATFORMS * Analytics & Reporting * SIEM * SOAR ENDPOINT SECURITY * EDR * MDR * XDR MANAGED SOC * SOC-as-a-Service ADVANCED DETECTION & PROTECTION * Inline Sandbox Solutions * NDR * Deception Systems * DRPS (EASM|BP|ACI) USE CASES * Insider Risk * Security Automation * Ransomware Protection * Phishing Protection * Platform Consolidation * Risk and Compliance QUICK LINKS * Security Operations Explained * FortiGuard Labs * Independent Testing * Products A-Z * Analyst Reports Cybersecurity Services CYBERSECURITY SUBSCRIPTIONS * FortiGuard Security Portfolio * Content Security: AV, IL-Sandbox, credentials * Web Security: URL, DNS, Video * Device Security: IPS, IoT, OT, botnet/C2 * Inline CASB Service FORTIGUARD REAL TIME THREAT INTELLIGENCE * FortiGuard Labs Research INCIDENT RESPONSE (IR) * Incident Response * Zero Days & Outbreak Alerts SECURITY PS SERVICES * Security Assessments & Readiness * Incident Readiness & Response FORTIOS INNOVATION * FortiOS USE CASES * DRPS (EASM|BP|ACI) * SOC-as-a-Service * SIEM * SOAR * Inline Sandbox Solutions * Ransomware Protection QUICK LINKS * Gartner Mesh Architecture * Security Fabric * Products A-Z * Analyst Reports Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports * Enterprise Network Security NETWORK SECURITY * Next-Generation Firewall * Secure Access Service Edge (SASE) * Intrusion Prevention Systems (IPS) * Secure Web Gateway (SWG) NOC MANAGEMENT * Central Management * Digital Experience Monitoring USE CASES * Hyperscale Security * Internal Segmentation * Network Automation QUICK LINKS * Security-Driven Networking Explained * Zero Trust Edge * Product Certifications * Products A-Z * Analyst Reports Enterprise Networking WAN * Secure SD-WAN * LTE/5G Gateway LAN * Switching * Wireless LAN (WLAN) * Network Access Control (NAC) WORK FROM HOME * Secure Work-From-Home NOC MANAGEMENT * Central Management * Artificial Intelligence for IT Operations * Digital Experience Monitoring * Cloud-Based LAN Management COMMUNICATIONS AND SURVEILLANCE * Voice and Collaboration * Video Surveillance USE CASES * Multi-Cloud SD-WAN * Secure SD-Branch * SD-Campus * Teleworker at Scale * Unified Communications QUICK LINKS * Network Operations Explained * Products A-Z * Analyst Reports Zero Trust Access ZTNA * Zero Trust Network Access (ZTNA) * Fabric & VPN Agent IDENTITY * Identity Access Management (IAM) * Identity as-a-Service USE CASES * Teleworking at Scale * Control Access & Rights for Every User * Work from Anywhere QUICK LINKS * Zero Trust Access Explained * FortiClient Download * Products A-Z * Analyst Reports Cloud Security HYBRID CLOUD SECURITY * Virtual Network Firewall * Denial-of-Service (DDoS) Protection CLOUD-NATIVE PROTECTION * Workload Protection & Cloud Security Posture Management * DevSecOps WEB APPLICATION / API PROTECTION * Web Application Firewall * Application Delivery and Server Load-Balancing SAAS SECURITY * Email Security USE CASES * AWS * Azure * Google Cloud * Microsoft 365 * SAP QUICK LINKS * Cloud Security Explained * Free Trials * Products A-Z * Analyst Reports Security Operations SOC ANALYTICS PLATFORMS * Analytics & Reporting * SIEM * SOAR ENDPOINT SECURITY * EDR * MDR * XDR MANAGED SOC * SOC-as-a-Service ADVANCED DETECTION & PROTECTION * Inline Sandbox Solutions * NDR * Deception Systems * DRPS (EASM|BP|ACI) USE CASES * Insider Risk * Security Automation * Ransomware Protection * Phishing Protection * Platform Consolidation * Risk and Compliance QUICK LINKS * Security Operations Explained * FortiGuard Labs * Independent Testing * Products A-Z * Analyst Reports Cybersecurity Services CYBERSECURITY SUBSCRIPTIONS * FortiGuard Security Portfolio * Content Security: AV, IL-Sandbox, credentials * Web Security: URL, DNS, Video * Device Security: IPS, IoT, OT, botnet/C2 * Inline CASB Service FORTIGUARD REAL TIME THREAT INTELLIGENCE * FortiGuard Labs Research INCIDENT RESPONSE (IR) * Incident Response * Zero Days & Outbreak Alerts SECURITY PS SERVICES * Security Assessments & Readiness * Incident Readiness & Response FORTIOS INNOVATION * FortiOS USE CASES * DRPS (EASM|BP|ACI) * SOC-as-a-Service * SIEM * SOAR * Inline Sandbox Solutions * Ransomware Protection QUICK LINKS * Gartner Mesh Architecture * Security Fabric * Products A-Z * Analyst Reports Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports * Small Business Complete Protection Network Security Endpoint Security Secure Cloud Applications and Email Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports * Service Providers Managed Services Expand and grow by providing the right mix of adaptive and cost-effective security services Learn More SOLUTIONS * MSSP Cybersecurity * Managed SD-WAN for Service Providers * Managed SOC Service * Managed Cloud Security Service * Managed WAF Service CASE STUDIES * Orange Business Services * GTT Communications * Spark NZ * See All QUICK LINKS * Products A-Z * Resource Center * Request a Quote Communications Service Providers Expand and grow by providing the right mix of adaptive and cost-effective security services Learn more SOLUTIONS * Overview * Headquarters Network Security * PCI Compliance * Secure Networking * ATP * Adaptive Cloud Security QUICK LINKS * Products A-Z * Resource Center * Request a Quote Mobile Provider Protect your 4G and 5G public and private infrastructure and services. Monetize security via managed services on top of 4G and 5G. Learn More SOLUTIONS * Network Security * SD-WAN & Network Access * Cloud & Application Security * Security Operations MOBILITY USE CASES * Security for 4G and 5G Networks and Services * Radio Access Network Security * Security for Private 5G Mobile Networks * Securing the Mobile IoT Ecosystem * Security for the Telco Cloud QUICK LINKS * Products A-Z * Resource Center * Request a Quote Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports Contact Us * Partners Technology Alliances FOR TECH PARTNERS * Fabric-Ready Program * Join the Ecosystem FOR CUSTOMERS * Ecosystem Overview * Fabric Connectors QUICK LINKS * Fabric-Ready Partners A-Z * Resource Center * Request a Quote Find a Partner Become a Partner Partner Login Support & Services FORTICARE SUPPORT * FortiCare Technical Services * Advanced Support * FORTICARE PROFESSIONAL SERVICES * * Professional Services * Cloud Consulting Services * Training Institute EDUCATION * Cybersecurity Prof Education * Security Awareness & Training QUICK LINKS * Resource Center * Request a Quote * Contact Us * Products A-Z * Analyst Reports Cyber Readiness Center and Breaking Threat Intelligence: Click here to get the latest recommendations and Threat Research LEGAL 1. Rules and regulations: The following rules and regulations apply to all visitors to or users of this Web Site, to Fortinet, Inc. (“Fortinet”) end users, Fortinet channel partners, or to Fortinet vendors and suppliers as set forth below. By accessing this Web Site, user acknowledges acceptance of relevant terms and conditions. Fortinet, Inc. ("Fortinet") reserves the right to change these rules and regulations from time to time at its sole discretion. In the case of any violation of these rules and regulations, Fortinet reserves the right to seek all remedies available by law and in equity for such violations. These rules and regulations apply to all visits to the Fortinet Web Site, both now and in the future. 2. Limited License: Fortinet hereby authorizes you to copy materials published by Fortinet on this Web Site solely for non-commercial use within your organization (or if you are a FortiPartner, your customer's organization) in support of Fortinet products. No other use of the information is authorized. In consideration of this authorization, you agree that any copy of these materials which you make shall retain all copyright and other proprietary notices in the same form and manner as on the original. Except as specified above, nothing contained herein shall be construed as conferring by implication, estoppel or otherwise any license or right under any patent, trademark or copyright of Fortinet or any third party. ALL CONTENTS ON THIS SITE ARE PROTECTED BY COPYRIGHT. EXCEPT AS SPECIFICALLY PERMITTED HEREIN, NO PORTION OF THE INFORMATION ON THIS WEB SITE MAY BE REPRODUCED IN ANY FORM, OR BY ANY MEANS, WITHOUT PRIOR WRITTEN PERMISSION FROM FORTINET. VISITORS OR USERS ARE NOT PERMITTED TO MODIFY, DISTRIBUTE, PUBLISH, TRANSMIT OR CREATE DERIVATIVE WORKS OF ANY MATERIAL FOUND ON THIS SITE FOR ANY PUBLIC OR COMMERCIAL PURPOSES. 3. Disclaimer: FORTINET MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS WEBSITE. Fortinet intends the information contained in this Web Site to be accurate and reliable. However, errors may occasionally occur. Therefore, all information and materials are provided "AS IS" without any warranty of any kind. FORTINET DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, REGARDING ANY MATTER WHATSOEVER RELATING TO OR REFERENCED BY THIS WEB SITE, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. The information contained in this website represents the view of Fortinet, Inc. on the issues discussed as of the date of publication. Because Fortinet must respond to changing market conditions, the information contained on this web site should not be interpreted as a commitment on the part of Fortinet. This website is for informational purposes only. Fortinet may have patents, patent applications, trademarks, copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Fortinet, the furnishing of this website or documents contained in this website does not give you any license to these patents, trademarks, copyrights or other intellectual property. NOTWITHSTANDING ANYTHING TO THE CONTRARY, IN NO EVENT IS ANY FORTINET SALES PERSON, INCLUDING, AMONG OTHERS, ANY SENIOR SALES EXECUTIVE OR COUNTRY, MULTI-COUNTRY OR REGIONAL MANAGER OR VICE PRESIDENT, AUTHORIZED TO BIND FORTINET IN ANY WAY TO ANY CONTRACTUAL OBLIGATIONS OR COMMITMENTS, ASSOCIATED WITH SALES OR PURCHASES OR OTHERWISE, IN RELATION TO RETURN RIGHTS, FUTURE DELIVERABLES, OR OTHERWISE. ANY SUCH PURPORTED COMMITMENTS ARE NULL AND VOID, NOT BINDING, AND OF NO EFFECT. NOTWITHSTANDING ANYTHING TO THE CONTRARY, THERE ARE NO RIGHTS OF RETURN UNLESS EXPRESSLY STATED PURSUANT TO AN AGREEMENT IN ADVANCE APPROVED PURSUANT TO FORTINET’S PROCESSES AND SIGNED BY THE COMPANY’S GENERAL COUNSEL OR VICE PRESIDENT OF LEGAL. 4. Compliance with Applicable Laws: Export Controls: The software and technical data on this web site is subject to the laws, regulations, orders or other restrictions regarding import to, and export and re-export from, various countries, including export and re-export restrictions that may be imposed by applicable laws of the United States. By downloading or accessing software or technical data, you are agreeing not to import, export or re-export, either directly or indirectly (including transmission and shipment) except in accordance with all applicable laws, and you are accepting responsibility to determine what is necessary to assure such compliance. In particular, but without limitation, you agree not to export, re-export or provide the software or technical data: * to, or to a national or resident of: Cuba, Iran, North Korea, Syria, and the Crimea Region of Ukraine or to any other country embargoed or restricted by the U.S. (This list is subject to change, and you must comply with the proscribed lists as they exist in fact.) * to anyone on the U.S. Commerce Department's Table of Denial Orders or the U.S. Department of Treasury's Specially Designated Nationals Lists, or * to any person or entity who has been prohibited from participating in U.S. export transactions by any agency of the U.S. Government. You are also agreeing not to download, transfer, export or re-export Fortinet products, technology or software to yourself, your customers or any intermediate entity in the chain of supply if our products will be used in the design, development, production, stockpiling or use of missiles, chemical or biological weapons or for nuclear end uses, without obtaining prior authorization from the U.S. Government. FortiPartners can also find additional export control information at: https://partnerportal.fortinet.com in the "Notes and other Tools" Section by clicking on the Global Trade Compliance link. If you have further questions please contact our Global Trade Compliance Department at exportalert@fortinet.com. 5. Trademarks: Any trademarks, logos and service marks ("Marks") displayed on this Web Site are the property of Fortinet or other third parties. Users are not permitted to use these Marks without the prior written consent of Fortinet or such third party which may own the Mark. "Fortinet," "FortiGate," "FortiContent®," "FortiOS," "FortiBIOS," and "FortiASIC" are either registered trademarks or trademarks of Fortinet Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 6. Products and Availability: Because international information is provided at this Web Site, not all products or programs mentioned will be available in your country. Please contact your local authorized reseller for Fortinet products for information as to products and services available in your country. 7. Software License, Service Terms & Conditions and End User License Agreement: Any software which you download is governed in accordance with (i) the license terms accompanying the file or (ii) if no license terms accompany the file, the terms of the license agreement which accompanied the original product licensed by you which you are updating or (iii) the license terms pursuant to this End User License Agreement. All Fortinet products are subject to the terms of Fortinet’s End User License Agreement. Warranty and Support activation is based on the earliest one of 3 events that need to occur. The initial connection of the product with Fortinet, registration of the product at Fortinet or 60 (US/Canada) or 100 days (International) after product is shipped from Fortinet. See US/Canada and EMEA/APAC/LATAM warranty policy for further details. Please see the following for the terms and conditions for Fortinet Services: Fortinet Service Terms & Conditions, as updated from time to time in Fortinet’s discretion. Fortinet support is only available for products that you purchased directly from an authorized Fortinet channel partner. Products not purchased from an authorized Fortinet channel partner are not eligible, and will not be supported. To find an authorized Fortinet channel partner for your purchase, please visit https://www.fortinet.com/partners/partner-program/find-a-partner.html. 8. Privacy: Fortinet has a privacy policy, incorporated herein, designed to let you know what information we collect when you use our website and our products and services, including why we collect it, and how we safeguard it. Our privacy policy is provided so that you can make informed choices about which products to use and how to use them, located here: Privacy Policy 9. Terms and Conditions of Sale: The following terms and conditions apply to all Fortinet sales directly, if and when applicable: Sales Order Acknowledgment 10. Purchase Order Terms and Conditions for Vendors/Suppliers; Vendor/Supplier Code of Conduct The following standard terms and conditions apply to Fortinet purchase orders for procurement: Purchase Order Terms & Conditions Additionally, the following applies to all Fortinet Vendors/Suppliers: Vendor/Supplier Code of Conduct 11. California Transparency in Supply Chains Act of 2010: View Fortinet’s Response to the Act 12. Fortinet Partner Code of Conduct: All Fortinet partners, such as distributors, resellers, alliance partners, and their employees, independent contractors, and agents agree to conduct themselves in a legal and ethical manner and in line with Fortinet’s Partner Code of Conduct located here: Fortinet Partner Code of Conduct 13. Fortinet Anti-Corruption Policy: Fortinet’s policy on anti-bribery and anti-corruption is located here: Fortinet Anti-Corruption Policy CONTACT US TO GET STARTED LEARN MORE GET TECHNICAL SUPPORT ASSISTANCE Products ENTERPRISE * Network Security * Cloud Security * Security Operations * Zero Trust Access * Threat Intelligence SMALL MID-SIZED BUSINESSES * Overview SERVICE PROVIDERS * Overview Partners * Overview * Alliances Ecosystem * Find a Partner * Become a Partner * Partner Login Discover More * About Us * Contact Us * Training * Resources * Support * Product Downloads * COVID-19 Response * CyberGlossary * Careers * Early Talent Program * Investor Relations * Social Responsibility * Sitemap Enter Email Address Subscription Successful! Request Failed. Please try again later! I want to receive news and product emails. Read our privacy policy. Connect With Us * Email Preference Center * Blog * Fortinet Community * Fuse Community * * * * * * Products Enterprise * Network Security * Cloud Security * Security Operations * Zero Trust Access * Threat Intelligence Small Mid-Sized Businesses * Overview Service Providers * Overview Partners * Overview * Alliances Ecosystem * Find a Partner * Become a Partner * Partner Login Discover More * About Us * Contact Us * Training * Resources * Support * Product Downloads * COVID-19 Response * CyberGlossary * Careers * Early Talent Program * Investor Relations * Social Responsibility * Sitemap Enter Email Address Subscription Successful! Request Failed. Please try again later! I want to receive news and product emails. Read our privacy policy. Connect With Us * Email Preference Center * Blog * Fortinet Community * Fuse Community Copyright © 2022 Fortinet, Inc. All Rights Reserved. * Terms of Service * Privacy Policy * Notice for California Residents * Do Not Sell My Personal Information * GDPR * Cookie Settings ©Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates, and is used herein with permission. All Rights Reserved. Also of Interest * What is SD-WAN? * Regulatory Compliance Solutions * LTE/5G Wireless WAN Request a quoteContact UsFree Demo × PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. privacy policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * 33ACROSS 33ACROSS View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All By clicking “Accept All”, you agree to use of cookies on your device to enhance site functionality, analyze site usage, and assist in our marketing efforts. The Cookies Settings link has cookie-specific detail and preference options. privacy policy Cookies Settings Accept All