Fortinet FortiClient and Microsoft Defender for Endpoint compete in the endpoint protection category. Microsoft Defender for Endpoint often holds the upper hand due to its comprehensive features.
Features: Fortinet FortiClient is praised for its VPN capabilities, threat detection, and remediation functions. Microsoft Defender for Endpoint stands out with advanced threat intelligence, integration with Microsoft 365, and automated investigation features.
Room for Improvement: Fortinet FortiClient could enhance its reporting tools, malware detection accuracy, and user interface. Microsoft Defender for Endpoint needs performance optimization, fewer false-positive alerts, and improved support for non-Microsoft platforms.
Ease of Deployment and Customer Service: Fortinet FortiClient is valued for its straightforward deployment process and responsive customer support. In contrast, Microsoft Defender for Endpoint can be complex to deploy but benefits from extensive documentation and strong technical support.
Pricing and ROI: Fortinet FortiClient is generally perceived as cost-effective with a strong return on investment. Microsoft Defender for Endpoint is more expensive, but users feel the extensive feature set justifies the higher cost.
The return on investment is primarily in time savings and better observability of what's happening.
They initiate the troubleshooting process quickly and resolve issues in a timely manner.
The main issue revolves around addressing bugs in the endpoint.
The technical support for FortiClient is excellent.
The level-one support seems disconnected from subject matter experts.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
I rate Microsoft support 10 out of 10.
We can recommend FortiClient for small organizations with 50 to 60 users as well as for larger enterprises due to its extensive features.
I hope Fortinet will start an insider developer program where professionals can provide feedback on new releases to ensure improvements.
We can add more licenses and Fortinet tokens, demonstrating excellent scalability.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
It's pretty easy to scale with Microsoft, as they make it easy if you look into the documentation.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
Its stability level is excellent.
Defender for Endpoint is extremely stable.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
FortiClient needs improvement in restricting user information and ensuring more secure customer data to better protect source code and reduce the risk of security breaches.
Fortinet should focus on better iOS testing before release to avoid these bugs.
There are advanced features like Zero Trust that I currently do not use but could be beneficial for security.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
An additional feature that could be included in the next release is free Copilot.
Justifying the price to clients can be difficult.
FortiClient is included in a package with the UTM features, so there is no separate cost for it.
Recently, Fortinet has increased prices for its products.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
We appreciate its VPN capabilities and the features that offer extra security functionalities like antivirus and malware scanning.
The most valuable feature of FortiClient is its high security level.
It enhances our business by allowing our agents to work remotely, which we had not been able to do before.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Attack surface reduction and limiting attack surface vectors are valuable features.
Web filtering is the most valuable feature of Microsoft Defender for Endpoint because it effectively maintains security for website access.
FortiClient is a fabric agent that delivers endpoint protection, endpoint compliance, and secure access in a single, lightweight, lightweight client, providing visibility, information, and control to your endpoints. In addition, it enables secure, remote connectivity to the security fabric. It also integrates network and endpoint with segmentation and automation. FortiClient enables unified endpoint awareness by sharing endpoint telemetry with the security fabric. It is compatible with third-party EDR (endpoint detection and response and anti-malware solutions.
The FortiClient fabric agent can:
• Report on the status of a device, including firmware version and applications running.
• Send all suspicious files to a fabric sandbox.
• Enforce USB control, application control, URL filtering, and firmware upgrade policies.
• Provide application firewall service and malware protection.
• Enable devices to connect securely to the security fabric over either ZTNA tunnels or VPN (IPsec or SSL), both encrypted. The connection to the security fabric can be either a SASE service or a FortiGate next-generation firewall.
You can purchase FortiClient with one of three levels of capability:
Zero Trust security - The ZTNA edition enables both VPN and ZTNA encrypted tunnels, as well as USB device control and URL filtering.
Endpoint security - The EPP/APT edition adds AI-based NGAV (next-generation antivirus), application firewall, endpoint quarantine, and support for cloud sandbox.
Cloud-based endpoint security
Benefits and Features
• Fabric agent leverages integrations and provides telemetry information to the rest of the Fortinet security fabric.
• SAAS control and web/content filtering
• Dynamic access control helps with automation and simplifies compliance.
• Software inventory management enables visibility as well as management of licenses.
• Automated response detects and isolates any endpoints that may be compromised.
• ZTNA delivers better remote access and consistent application access policies
• Managed endpoint security services remotely assist with setup, configuration, deployment, vulnerability monitoring, and overall monitoring of endpoint security.
Reviews from Real Users:
PeerSpot users like that FortiClient is easy to use and integrates well with other solutions. They also appreciate the richness of its features and find it to be inexpensive in comparison to other products that require separate purchases for separate features.
Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
With its powerful machine-learning capabilities, it can detect and block sophisticated attacks before they can cause any harm. The solution also includes endpoint detection and response (EDR) capabilities, allowing organizations to quickly investigate and respond to security incidents. It provides detailed insights into the attack timeline, enabling security teams to understand the scope and impact of an incident.
Microsoft Defender for Endpoint also offers proactive threat hunting, allowing organizations to proactively search for and identify potential threats within their network. It integrates seamlessly with other Microsoft security solutions, such as Microsoft Defender XDR, to provide a unified and holistic security approach. With its centralized management console, organizations can easily deploy, configure, and monitor the security solution across their entire network.
Microsoft Defender for Endpoint is a robust and scalable security solution that helps organizations protect their endpoints and data from evolving cyber threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.