The primary use case is that we are using it as a network access control (NAC), preventing external devices from plugging into the network or foreign computers from joining the network.
We are using the latest version.
The primary use case is that we are using it as a network access control (NAC), preventing external devices from plugging into the network or foreign computers from joining the network.
We are using the latest version.
When it works, it's great. It keeps things off the network which are supposed to be off the network.
When it works, doing what it's supposed to.
Not using a Java front-end would be fantastic. It takes forever to load the system up and get in there to configure everything. It is too slow to do anything at all.
The stability is relatively poor, as it has taken us roughly 12 months to get the network access control to be functional. It took us six months to get the USB lockdown to work appropriately. It still false flags mice, etc. On top of it, it broke once we finally got the network access control working. It literally took us 12 months for people to be blocked on an Ethernet connection, and it takes about 90 seconds to knock them off. Even then, it's only 50/50. We have escalated this every week for 12 months, and I'm not sure we'll be renewing this contract.
The technical support is bad. We've had to escalate to Tier 2 and Tier 3. My customer relationship manager on the other side of this has stopped returning phone calls and emails, because there has been such a constant back and forth.
We didn't have something prior. We had someone do a security audit on us, and they made some recommendations of things that we were missing. We contacted a managed service provider to recommend things to fix these issues, and this was one of those things. We went with what the managed service provider recommended as a solution along with having a short timeframe.
The initial setup was highly complex. Every time you get one piece to work, everything else breaks. We have not been able to get a full solution in place.
We used a managed service provider to help get everything up and running.
The process was frustrating. The managed a lot of our network as is, and they've done several of these setups. They moved from the previous version to the newest version, and they have even stopped recommending it as a solution because they don't want to do this again with another customer.
Look into the complexity of using tools. Anything that is difficult to manage will probably be painful to maintain.
We have a very aggressive roadmap with a fairly mature security posture.
We use Fortinet FortiNAC to control user access and enforce system policies.
Fortinet FortiNAC helps add an extra layer of security.
The ease of deployment is valuable.
Fortinet FortiNAC's device compatibility could be improved, particularly for VoIP devices.
I have been using Fortinet FortiNAC for two years.
We have experienced stability issues, particularly with the latest firmware versions. The extended development cycle for these updates makes us hesitant to adopt new products immediately upon their release.
I would rate the stability of Fortinet FortiNAC a seven out of ten.
Fortinet FortiNAC is scalable.
When I compare the support of Fortinet to Cisco, I find it to be good but not as good as Cisco's.
Neutral
We previously used Cisco ISE and switched to Fortinet FortiNAC because the users found it more user-friendly and it was cheaper.
The deployment is straightforward and takes around 60 days to complete.
Fortinet FortiNAC is reasonably priced.
I would rate Fortinet FortiNAC a seven out of ten.
We use Fortinet FortiNAC for network access and identity protection.
The product's most valuable feature is its ability to protect devices connected to network service.
The product could be more user-friendly in terms of GUI than HPE. The configuration needs improvement as well.
We have been using Fortinet FortiNAC for two years.
It is a stable platform. I rate its stability a ten out of ten.
I rate the product’s scalability an eight out of ten. We have 100 users for it.
The product’s technical support services are good. Although sometimes, they respond slowly.
Neutral
I rate Fortinet FortiNAC’s initial setup process a seven out of ten. It takes two days to complete. The deployment process involves configuring the network access policies within the Azure environment.
It is a reasonable product.
It is a good product considering network security. It supports multiple devices and is easy to use. I can repair the box quickly in case of some failure. I rate it an eight out of ten.
FortiNAC provides authentication services for clients.
The users say that FortiNAC is configurable and easy to use.
I've been using FortiNAC for about three years.
FortiNAC's performance is excellent.
FortiNAC could be more scalable.
Setting up FortiNAC is straightforward, and it takes about a week to deploy.
I rate Fortinet FortiNAC seven out of 10. It's a configurable product that integrates well with the other Fortinet products. It's easy to use and has a lot of features. It's tough for me to give a product a perfect 10. It must be simple, scalable, stable, and have excellent features covering almost all our technological needs.
We installed Fortinet FortiNAC in a large company in a VM environment. They have a lot of end-users and complex user account needs. For example, some of the VIPs and different guests all need different access permissions and some of them are connected through the Active Directory credentials which we have to have a portal page for them to gain access.
Another layer of complexity is different users are receiving accounts from many departments. For example, the customer's IT department gives them access and they send the credentials to the guest by email. The IT department can limit their account in different ways, such as only allowing the account access for a period of time.
Fortinet FortiNAC has good user account customization.
We can change the logo for the portals to meet the customer's needs. The portal default language is English but it supports all languages, such as Turkish. The portal can be optimized very easily.
Device profiling is a good feature, we can block devices, such as iOS or Android.
Endpoint compliance is a great feature that allows us to restrict and quarantine devices. For example, if a device is not using the latest version of an operating system or antivirus program we can detect it and prohibit their access. If certain conditions are met with the customer's policies, we can let them have access. Otherwise, our endpoints compliance rules block or quarantine their devices on the network.
Integration is hard in Fortinet FortiNAC, but they are evolving and getting better. For example, with Cisco, Aruba, Huawei, and Extreme devices, Fortinet FortiNAC is working properly, but some other devices have problems.
I have been using Fortinet FortiNAC for a couple of months.
The solution is stable.
Fortinet FortiNAC can extend your existing network. For example, if you have to put another switch, access point, or another networking device to complete the site we can with one or two clicks add these devices and the same rules and policies. It is highly scalable and can extend your infrastructure.
We currently have two customers using Fortinet FortiNAC
The installation is not straightforward, it can be hard. The documentation should be better in explaining to process in more detail. The installation requires too much experience and knowledge about network infrastructure. It's not easy, you have to be an expert.
The difficulty level of the installation and time depends on many factors. For example, one of our customer's installations was simple because they only had to block one site and only had one hardware vendor, such as Cisco.
Our second installation was more difficult because the customer had many different hardware vendors, such as Cisco, Huawei, Aruba, and Extreme as part of their infrastructure. This requires configuring different settings on every device, it can be complicated. This can take a lot of time.
We do the implementation and the amount of staff needed depends on the size of the infrastructure and hardware vendors involved. If it is a smaller environment with a single vendor then the process could take two to three days.
If the customer size is very large and they are using the different sites and cities, and many different network infrastructures, the implementation would take time and you would have to manage everything well. When you have a complex network, it can take approximately15 days to implement. The number of vendors they're working with can increase the implementation time duration. If companies only have one vendor, it's easy, but two or three different vendor integration is a little bit harder and takes time.
Customer's needs are very important, because some customers, only want that 1x configuration. However, other customers want 1x configuration, custom portal pages, and many endpoint compliance rules. The more features the more time it will take.
The price of the license required is based on how many users are going to be using the solution. If you want more users you can upgrade your license.
I have evaluated other NAC solutions.
I would recommend Fortinet FortiNAC to others because we did evaluate other NAC solutions and this solution is very good compared to the others. The best benefit of Fortinet FortiNAC is the stability and it can work with other vendors. Some NAC products only work with their products and do not support other vendors.
The major benefit I have found is that this solution can work with other products. A customer typically has more than one vendor, such as access points, printers, and other network products. A lot of the other vendors only are working with their products. It's very important for me that Fortinet FortiNAC can work with the other vendors properly and can integrate easily. When I check the Fortinet website, it shows every vendor's details with an explanation about the integration of the Fortinet FortiNAC. For example, you can find out how to integrate the Fortinet FortiNAC with the Cisco wireless controller. I can find the documents, turn to the pages and find all the information I need. I can find it very easily.
I rate Fortinet FortiNAC a nine out of ten.
The product offers good profiling features and can support various vendor products.
FortiNAC could improve integration with other vendors and enhance stability to compete more effectively with solutions like Cisco ISE.
We've been using both FortiNAC for about four years.
We contacted Fortinet's technical support, who helped resolve our issues.
Positive
Cisco ISE is more stable but comes at a higher cost than FortiNAC.
Deploying FortiNAC can be time-consuming, especially considering the integration challenges with other vendors.
Integrating FortiNAC with other vendors can be challenging, especially for Ruckus and Intelisys. We find Cisco ISE more comfortable for vendor integration.
I recommend FortiNAC, but with the caveat that users may encounter challenges with integration and stability.
I rate it a seven out of ten.
The customer required centralizing control to control access, detection, and network control. He requested processing a simple management point, the access, the devices, and distribution, and wanted to manage all the customer devices. He had a history of working with FortiNAC devices and wanted us to do the same. So I installed the product to understand it.
The features are more expandable.
The interface works fine, but it could be better.
It was for a one-time product solution for a customer for about one year, and I'm still maintaining it. So far, we've had one client for it.
The solution is stable.
The product is scalable.
We never had to use customer service or support, so it expired.
Neutral
It was easy to set up the product.
I would rate this solution seven out of ten.
We are only consultants, so we implement FortiNAC for our customers. The good part about FortiNAC is that it works seamlessly across either public cloud, private cloud, a hybrid one or on premises. So, depending on the client's requirements, I usually suggest that they go for public cloud where they have remote locations, and that they go for an application where they have a large deployment, adequate network and technical staff to support the requests.
The features we generally propose is basically agent-based authentication and the agent case solution product for wireless endpoints, which allow them to do automatic registration, and the third would be the health checks.
Something that the developers of FortiNAC might look at to improve, is more integration with third-party products. The dashboard also needs to improve.
FortiNAC is quite a stable solution.
FortiNAC is a highly scalable product. The licenses remain unlimited. It's a subscription-based license, which is based on the usage and number of concurrent users. So the good part is that it can be deployed out of any environment.
The technical support for us has been extremely good and the local support is excellent.
The initial setup was easy and straightforward. The deployment can be done within a day.
The good thing about FortiNAC is that it's more vendor agnostic. And then we have the deployed FortiNAC activate solution, which are different kinds of firewalls, which works perfectly fine.
On a scale from one to 10, my rating for this program will be a nine. Additional features that I would like to see included in the next release of this solution is more integration with third-party products and probably some improvements on the dashboard.