

Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR).
We have reduced manual analyst effort by thirty to forty percent.
Many ThreatConnect Threat Intelligence Platform (TIP) customers report saving more than fifty percent of analyst time previously spent on manual threat data processing.
This trust has led to an increase in sales because customers are confident we can protect their data.
The technical support from Fortinet is excellent.
For setting up some proper solutions for issues at the customer site, it can take about one week.
I believe the support from Fortinet is very good based on my experiences asking for help.
The customer support team was responsive and knowledgeable, helping to resolve my issues efficiently and providing valuable assistance during onboarding and troubleshooting.
They have been responsive, knowledgeable, and helpful.
I just like their customer support because, within a short period of contacting them, they are able to help navigate issues.
When implemented in a Fortinet environment with an existing firewall, FortiAnalyzer, and FortiManager, it is straightforward to install and scale by adding more EDR for endpoints.
I can give it nine points in terms of scalability.
The platform handles increased volumes of threat data, large numbers of users, and expanded deployments across multiple offices without performance degradation.
ThreatConnect supports scalability by allowing us to identify threats and share information within our team networks.
After that, I stopped scanning the Cisco AnyConnect and switched to Fortinet VPN. Everything worked fine afterward.
For stability, I would give it a score of ten, as we are not having any issues with that currently.
The platform handles significant traffic while maintaining performance across cloud and on-premises deployments.
Sometimes, when using the solution, it slows down, affecting our ability to mitigate threats.
Fortinet could consider reducing the minimum order quantity for EDR, currently set at 500 pieces.
The pricing is high for smaller organizations, so it would be beneficial to have tiered pricing.
ThreatConnect Threat Intelligence Platform (TIP) could be improved by simplifying the user interface to better fit day-to-day analyst workflow.
Improved pricing or tiered options could make it more accessible, especially for smaller organizations that do not require all enterprise features.
It's reasonably priced compared to other vendors' similar products.
The pricing is moderate; I cannot label it as cheap, but it is moderate compared to other main solutions.
Some clients reported that the entry cost started around six figures, depending on deployment, configuration, and support options chosen.
The pricing seems a bit high for smaller companies.
Generally, the pricing and setup cost are on the higher side.
The four pillars of the solution are security access via VPN, ZTNA, attack surface protection, and automatic incident response, integrating with Fortinet Security Fabric.
This is especially relevant for government projects where the SD-WAN solution is within their private network, not touching the Internet or any other access.
The features are simple to use, and the interface is user-friendly, making it easy to navigate and apply the solutions.
ThreatConnect Threat Intelligence Platform (TIP) can ingest and normalize threat intelligence from various internal and external sources including OSINT feeds, commercial feeds, internal logs, and EDR tools, centralizing it in one place and enriching that data with context to make it more actionable.
The API-first architecture that enables us to perform custom integration with other products and real-time distribution.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiEDR | 3.0% |
| CrowdStrike Falcon | 8.7% |
| Microsoft Defender for Endpoint | 7.3% |
| Other | 81.0% |
| Product | Market Share (%) |
|---|---|
| ThreatConnect Threat Intelligence Platform (TIP) | 3.7% |
| Recorded Future | 7.7% |
| CrowdStrike Falcon | 4.6% |
| Other | 84.0% |

| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 9 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 23 |
| Large Enterprise | 4 |
Fortinet FortiEDR is a real-time endpoint protection, detection, and automated response solution. Its primary purpose is to detect advanced threats to stop breaches and ransomware damage. It is designed to do so in real time, even on an already compromised device, allowing you to respond and remediate incidents automatically so your data can remain protected.
Fortinet FortiEDR Features
Fortinet FortiEDR has many valuable key features, including:
Fortinet FortiEDR Benefits
Some of the key benefits of using Fortinet FortiEDR include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Fortinet FortiEDR users.
An Owner at a security firm says, "The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers. The customer has literally about 800 cash registers. That was the use case for Fortinet FortiEDR - to get that down into a tiny space. The only way to do that was to use this product because it had that ability to unbundle services that were a surplus.”
Chandan M., Chief Technical Officer at Provision Technologies LLP, mentions, “The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration.” He also adds, “The security is also very good and the firewall response is good.”
Harpreet S., Information Technology Support Specialist at Chemtrade Logistics, explains, "It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
DeAndre V., Senior Network Administrator at a financial services firm, states, “The dashboard is easy to follow and use. The deployment and uninstalling were easy. I like the detailed information about the path of a file that might be suspicious. Being able to check that out was easy to follow. Exceptions are easy to create and the interface is easy to follow with a nice appearance.
ThreatConnect Threat Intelligence Platform provides a comprehensive solution for operational threat intelligence. It effectively ingests and enriches data, aligning with intelligence requirements for seamless application across security operations.
ThreatConnect TIP stands out by integrating threat intelligence with orchestration for streamlined threat management. It simplifies the user experience with a customizable interface assisting security teams in operationalizing insights across multiple teams without disruption. The platform automates threat scoring and optimizes threat correlation and response, ensuring timely threat detection and protection. Collaboration with Polarity and Risk Quantifier accelerates actionable intelligence, while support and patch management enhance overall user experience. Although improvements in integration processes and training accessibility are necessary, the platform aggregates threat data for efficient threat mitigation.
What are the key features of ThreatConnect TIP?In industries focusing on security, ThreatConnect TIP supports teams in identifying and mitigating security threats through automation. Integrated with cybersecurity networks, it assists in endpoint protection, SOC management, and vulnerability management, being pivotal in threat investigation and intelligence dissemination.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.