Fortinet black logo

About FortiAnalyzer for AliCloud

About FortiAnalyzer for AliCloud

FortiAnalyzer securely aggregates log data from physical and virtual Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, you can filter and review records, including traffic, event, virus, attack, web content, and email data, mining the data to determine your security stance and assure regulatory compliance. FortiAnalyzer is one of several versatile Fortinet management products that provide diverse deployment types, growth flexibility, advanced customization through APIs, and simple licensing.

Highlights of FortiAnalyzer for AliCloud include the following:

  • Predefined and customized charts help monitor, maintain, and identify attack patterns, acceptable use policies, and demonstrate policy compliance
  • Scalable architecture allows the device to run in collector or analyzer modes for optimized log processing
  • Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks

About FortiAnalyzer for AliCloud

FortiAnalyzer securely aggregates log data from physical and virtual Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, you can filter and review records, including traffic, event, virus, attack, web content, and email data, mining the data to determine your security stance and assure regulatory compliance. FortiAnalyzer is one of several versatile Fortinet management products that provide diverse deployment types, growth flexibility, advanced customization through APIs, and simple licensing.

Highlights of FortiAnalyzer for AliCloud include the following:

  • Predefined and customized charts help monitor, maintain, and identify attack patterns, acceptable use policies, and demonstrate policy compliance
  • Scalable architecture allows the device to run in collector or analyzer modes for optimized log processing
  • Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks