Practice Director & Technologies Advisory at Happiest Minds Technologies
Real User
Top 20
2024-09-30T09:09:00Z
Sep 30, 2024
FortiNAC especially goes to ISP customers. They prefer to use these solutions as integration. Their back-end infrastructure is quite okay. Whereas, with Cisco ISE, if you are talking about that, it’s for enterprise customers with data centers, branch offices, and different kinds of setups like primary and secondary offices.
I use the tool to maintain strict network control. It blocks suspicious connections and only allows specified access. You can control it through MAC addressing. It's all about managing the network so it's not accessible to any unauthorized user or machine.
The primary use case for this solution is to enhance network security within our organization. We utilize it in various environments, adapting to customer networks which sometimes require setting up power and routing due to multiple lines.
Security, infrastructure and networking engineer at Abetelnet Solutions
Real User
Top 5
2024-06-06T19:23:31Z
Jun 6, 2024
We use the tool to connect different networks, like connecting one side to another. Additionally, we deploy some policies to allow certain users within the network environment.
Software Development Specialist at Unicomp Information Co. Ltd.
Reseller
Top 5
2024-01-05T08:10:00Z
Jan 5, 2024
It is mainly used by clients in the healthcare sector. In certain instances, the solution is implemented to address specific scenarios involving the deployment of devices within the IT infrastructure.
We used it for network access control of internal users on wired networks, as well as to enforce USB port blocking. Some complaints were directed to me, and that was the primary use case.
Fortinet FortiNAC is very easy to use, and we can run the proof of concept in one day. The main part of the configuration is to create the policies. We can present more of the solution and protect more clients with it.
Fortinet FortiNAC is a network address control solution that we use as an identity and access management server. We integrate it with network devices and workstations to create policies and privileges for network access and device management. It also performs posture checks on Windows workstations to ensure compliance with security policies before granting network access. Essentially, it profiles endpoints and workstations, and checks for security compliance (such as updated patches, enabled firewall, and vulnerability compliance) before granting network access.
Technology Consultant Team Head at Ignite Solutions
Real User
2022-10-20T20:05:00Z
Oct 20, 2022
Our customers are from the security and financial services industries. FortiNAC is a network access control. In banking systems and in terminals, we need to manage VLAN and receive reports like IBS and IDS. Every VLAN has specific information to share some, but not all, of the files, because there are restrictions in the banking and financial systems.
Security Solutions Architect at a manufacturing company with 1,001-5,000 employees
Real User
2022-09-06T11:56:00Z
Sep 6, 2022
The primary use case is for the visibility of the entire network architecture. It provides visibility to the switches, and routers to see the domain users, contractors, and guest users. It provides network access control, to be able to tell what endpoints are running on the machine, and what windows updates are on the machine. It is also used for cyber threat control.
The customer required centralizing control to control access, detection, and network control. He requested processing a simple management point, the access, the devices, and distribution, and wanted to manage all the customer devices. He had a history of working with FortiNAC devices and wanted us to do the same. So I installed the product to understand it.
Head Of Information Technology at Zambia National Building Society
Real User
2022-07-05T14:36:00Z
Jul 5, 2022
We use this solution for network access control to ensure that access into our environment, especially our endpoints, is controlled. We have 23 sites in different geographic locations, so we want to make sure that a person can't just sneak into a branch, plug in a device, and connect to the network. We also want to reduce the risk of connecting endpoints that have vulnerabilities, for an added layer of protection. If you're missing patches of security, you basically have no firewall because those are potential entry points for attackers. We want to control and manage them from a central point so that, if there are any potentially hazardous connections, we are able to block the user but also remediate in the case of Microsoft updates or if updates are missing on their PC.
I was a distributor and system integrator of FortiNAC. We were opening a lot of tickets and there were lots of bugs, so I replaced it with Forescout very easily. Within two days, I replaced everything. With FortiNAC, I was just doing the implementation, making things work properly, and beginning testing after five days. FortiNAC is deployed on-prem. They're not major enough to be on cloud. Even on-prem is not doing good.
We installed Fortinet FortiNAC in a large company in a VM environment. They have a lot of end-users and complex user account needs. For example, some of the VIPs and different guests all need different access permissions and some of them are connected through the Active Directory credentials which we have to have a portal page for them to gain access. Another layer of complexity is different users are receiving accounts from many departments. For example, the customer's IT department gives them access and they send the credentials to the guest by email. The IT department can limit their account in different ways, such as only allowing the account access for a period of time.
Technology Consultant Team Head at Ignite Solutions
Real User
2020-04-26T06:32:39Z
Apr 26, 2020
We are a solution provider and this is one of the products that we implement for our customers. It is used as part of the network security and protects our clients.
Asst. Network Security Engineer at a tech services company with 11-50 employees
Real User
2020-04-26T06:32:39Z
Apr 26, 2020
We are a solution provider and this is one of the products that we implement for our clients. My role is security and I deal with products to protect data centers. FortiNAC makes up part of the security solution in a data center.
Cyber Security Specialist at a tech services company with 51-200 employees
Real User
2020-04-02T07:00:12Z
Apr 2, 2020
I was certified in FortiNAC (Part of Fortinet-NSE6) last year and I've personally implemented FortiNAC in three organizations. We work as a team with people who have expertise in different areas and Vendors and have exposure to different infrastructures. FortiNAC scans your network to discover every user, application, and device (IOT), With up to 18 different techniques, it can then profile each element based on observed characteristics and responses for granular visibility - We then apply state-based control(eth0 VLAN switching) and Policy based control rules for access control and response. Anyone (Domain users, Contractors, guests, etc) wanting to connect to the network has to be accessed by the NAC. Users come in at different times and some may be working from branches or home through a VPN and they will be authenticated in the same way with different privileges on the Network. So it has to run 24/7. It's authenticating users all the time. We are gold partners with FortiNac.
Sr. Network Architect at a manufacturing company with 10,001+ employees
Reseller
2019-11-18T07:22:00Z
Nov 18, 2019
I'm a senior network architect and our company is a reseller of FortiNAC. This is a new product for me and we'll be starting implementation shortly. We've been testing the product and I'm just finishing the course. I'll be implementing for our client which is a medium-size company.
Fortinet's FortiNAC is a network access control solution that provides visibility, control, and automated response for everything that connects to the network, enhancing the security fabric. FortiNAC protects against Internet of Things (IoT) threats, extends control to third-party devices, and orchestrates automated responses to a variety of networking events.
Using many information and behavior sources, FortiNAC delivers extensive profiling of even headless devices on your network, allowing...
FortiNAC especially goes to ISP customers. They prefer to use these solutions as integration. Their back-end infrastructure is quite okay. Whereas, with Cisco ISE, if you are talking about that, it’s for enterprise customers with data centers, branch offices, and different kinds of setups like primary and secondary offices.
I use the tool to maintain strict network control. It blocks suspicious connections and only allows specified access. You can control it through MAC addressing. It's all about managing the network so it's not accessible to any unauthorized user or machine.
The primary use case for this solution is to enhance network security within our organization. We utilize it in various environments, adapting to customer networks which sometimes require setting up power and routing due to multiple lines.
We use the tool to connect different networks, like connecting one side to another. Additionally, we deploy some policies to allow certain users within the network environment.
We work with the RADIUS platform. It is mainly for Fortinet Security Fabric.
We use Fortinet FortiNAC for visibility and control.
We use Fortinet FortiNAC to control user access and enforce system policies.
It is mainly used by clients in the healthcare sector. In certain instances, the solution is implemented to address specific scenarios involving the deployment of devices within the IT infrastructure.
We use Fortinet FortiNAC for network access and identity protection.
We use the solution for network access control and endpoint profiling.
We used it for network access control of internal users on wired networks, as well as to enforce USB port blocking. Some complaints were directed to me, and that was the primary use case.
We use the solution as a firewall to protect the network.
Fortinet FortiNAC is very easy to use, and we can run the proof of concept in one day. The main part of the configuration is to create the policies. We can present more of the solution and protect more clients with it.
We use this solution to control the network.
Fortinet FortiNAC is a network address control solution that we use as an identity and access management server. We integrate it with network devices and workstations to create policies and privileges for network access and device management. It also performs posture checks on Windows workstations to ensure compliance with security policies before granting network access. Essentially, it profiles endpoints and workstations, and checks for security compliance (such as updated patches, enabled firewall, and vulnerability compliance) before granting network access.
Our customers are from the security and financial services industries. FortiNAC is a network access control. In banking systems and in terminals, we need to manage VLAN and receive reports like IBS and IDS. Every VLAN has specific information to share some, but not all, of the files, because there are restrictions in the banking and financial systems.
I use FortiNAC to limit access to our network; it's our firewall. We are customers of Fortinet and I'm a technical manager.
The primary use case is for the visibility of the entire network architecture. It provides visibility to the switches, and routers to see the domain users, contractors, and guest users. It provides network access control, to be able to tell what endpoints are running on the machine, and what windows updates are on the machine. It is also used for cyber threat control.
The customer required centralizing control to control access, detection, and network control. He requested processing a simple management point, the access, the devices, and distribution, and wanted to manage all the customer devices. He had a history of working with FortiNAC devices and wanted us to do the same. So I installed the product to understand it.
We use this solution for network access control to ensure that access into our environment, especially our endpoints, is controlled. We have 23 sites in different geographic locations, so we want to make sure that a person can't just sneak into a branch, plug in a device, and connect to the network. We also want to reduce the risk of connecting endpoints that have vulnerabilities, for an added layer of protection. If you're missing patches of security, you basically have no firewall because those are potential entry points for attackers. We want to control and manage them from a central point so that, if there are any potentially hazardous connections, we are able to block the user but also remediate in the case of Microsoft updates or if updates are missing on their PC.
I have used Fortinet FortiNAC in medium-sized banks, offices, campuses, and distribution networks for control.
We use the solution for VPN. I'm a product manager and we are customers of Fortinet.
I was a distributor and system integrator of FortiNAC. We were opening a lot of tickets and there were lots of bugs, so I replaced it with Forescout very easily. Within two days, I replaced everything. With FortiNAC, I was just doing the implementation, making things work properly, and beginning testing after five days. FortiNAC is deployed on-prem. They're not major enough to be on cloud. Even on-prem is not doing good.
We use Fortinet FortiNAC to receive excellent visibility of our network for traffic and what devices are connected to prevent attacks.
We installed Fortinet FortiNAC in a large company in a VM environment. They have a lot of end-users and complex user account needs. For example, some of the VIPs and different guests all need different access permissions and some of them are connected through the Active Directory credentials which we have to have a portal page for them to gain access. Another layer of complexity is different users are receiving accounts from many departments. For example, the customer's IT department gives them access and they send the credentials to the guest by email. The IT department can limit their account in different ways, such as only allowing the account access for a period of time.
Our customers use it for micro-segmentation in the network and authentication. We typically install this solution for medium-sized companies.
We are a solution provider and this is one of the products that we implement for our clients.
We are a solution provider and this is one of the products that we implement for our customers. It is used as part of the network security and protects our clients.
We are a solution provider and this is one of the products that we implement for our clients. My role is security and I deal with products to protect data centers. FortiNAC makes up part of the security solution in a data center.
I was certified in FortiNAC (Part of Fortinet-NSE6) last year and I've personally implemented FortiNAC in three organizations. We work as a team with people who have expertise in different areas and Vendors and have exposure to different infrastructures. FortiNAC scans your network to discover every user, application, and device (IOT), With up to 18 different techniques, it can then profile each element based on observed characteristics and responses for granular visibility - We then apply state-based control(eth0 VLAN switching) and Policy based control rules for access control and response. Anyone (Domain users, Contractors, guests, etc) wanting to connect to the network has to be accessed by the NAC. Users come in at different times and some may be working from branches or home through a VPN and they will be authenticated in the same way with different privileges on the Network. So it has to run 24/7. It's authenticating users all the time. We are gold partners with FortiNac.
The solution is generally used for compliance and other related items such as network visibility.
I'm a senior network architect and our company is a reseller of FortiNAC. This is a new product for me and we'll be starting implementation shortly. We've been testing the product and I'm just finishing the course. I'll be implementing for our client which is a medium-size company.