Fortinet
FORTINET (FSM-2000F) FSM-2000F FORTISIEM ALL-IN-ONE HW APPLIA
- SKU:
- FSM-2000F
- MPN:
- FSM2000F
- Availability:
- On backorder. Usual lead time is 3 weeks. Contact Us for Availability
Description
Description | |
Manufacturer: | Fortinet, Inc |
Manufacturer Part Number: | FSM2000F |
Manufacturer Website Address: | http://www.fortinet.com |
Brand Name: | Fortinet |
Product Line: | FortiSIEM |
Product Model: | FSM-2000F |
Product Name: | FortiSIEM FFSM-2000F Network Security Appliance |
Marketing Information: | Unified Event Correlation and Risk Management for Modern Networks Uptime is a mandate for today's digital business and end users do not care if their application problems are performance or security-related. That's where FortiSIEM comes in. Unified NOC and SOC Analytics (Patented) Fortinet has developed an architecture that enables unified data collection and analytics from diverse information sources including logs, performance metrics, SNMP Traps, security alerts, and configuration changes. FortiSIEM essentially takes the analytics traditionally monitored in separate silos - SOC and NOC - and brings that data together for a comprehensive view of the security and availability of the business. Every piece of information is converted into an event which is first parsed and then fed into an event-based analytics engine for monitoring real-time searches, rules, dashboards, and ad-hoc queries. Highlights | Machine Learning / UEBA FortiSIEM uses Machine Learning to detect unusual user and entity behavior (UEBA) without requiring the Administrator to write complex rules. FortiSIEM helps identify insider and incoming threats that would pass traditional defenses. High fidelity alerts help prioritize which threats need immediate attention. User and Device Risk Scoring FortiSIEM build a risk scores of Users and Devices that can augment UEBA rules and other analysis. Risk scores are calculated by combining several datapoints regarding the user and device. The User and Device risk scores are displayed in a unified entity risk dashboard. Distributed Real-Time Event Correlation (Patented) Distributed event correlation is a difficult problem, as multiple nodes have to share their partial states in real time to trigger a rule. While many SIEM vendors have distributed data collection and distributed search capabilities, Fortinet is the only vendor with a distributed real-time event correlation engine. Complex event patterns can be detected in real time. This patented algorithm enables FortiSIEM to handle a large number of rules in real time at high event rates for accelerated detection timeframes. Real-Time, Automated Infrastructure Discovery and Application Discovery Engine (CMDB) Rapid problem resolution requires infrastructure context. Most log analysis and SIEM vendors require administrators to provide the context manually, which quickly becomes stale, and is highly prone to human error. Fortinet has developed an intelligent infrastructure and application discovery engine that is able to discover both physical and virtual infrastructure, on-premises and in public/ private clouds, simply using credentials without any prior knowledge of what the devices or applications are. An up-to-date CMDB (Centralized Management Database) enables sophisticated context aware event analytics using CMDB Objects in search conditions. Dynamic User Identity Mapping Crucial context for log analysis is connecting network identity (IP address, MAC Address) to user identity (log name, full name, organization role). This information is constantly changing as users obtain new addresses via DHCP or VPN. Fortinet has developed a dynamic user identity mapping methodology. Users and their roles are discovered from on-premises or Cloud SSO repositories. Network identity is identified from important network events. Then geo-identity is added to form a dynamic user identity audit trail. This method makes it possible to create policies or perform investigations based on user identity instead of IP addresses - allowing for rapid problem resolution. |
Product Type: | Network Security Appliance |
Technical Information | |
Functionality: | Risk Management |
Interfaces/Ports | |
Total Number of Ports: | 4 |
USB: | Yes |
Number of Network (RJ-45) Ports: | 4 |
Network & Communication | |
Ethernet Technology: | Gigabit Ethernet |
Network Standard: | 1000Base-T |
Management & Protocols | |
Manageable: | Yes |
Power Description | |
Frequency: |
|
Power Consumption: | 310.50 W |
Physical Characteristics | |
Compatible Rack Unit: | 2U |
Form Factor: | Rack-mountable |
Height: | 88.9 mm |
Width: | 436.9 mm |
Depth: | 650.2 mm |
Weight (Approximate): | 26.31 kg |
Miscellaneous | |
Application/Usage: | Business |