Fortinet white logo
Fortinet white logo

User Guide

Overview

Overview

FortiAppSec Cloud provides an all-in-one dashboard for accessing the following four subservices:

  • Web Application Firewall (WAF)

    Protects public cloud hosted web applications from the OWASP Top 10, zero day threats, and sophisticated Layer 7 attacks with adaptive security policies and real-time threat intelligence. It also integrates FortiDAST's web vulnerability scanner (WVS) in its Vulnerability Scan feature.

  • Advanced Bot Protection

    Detects and mitigates malicious automated traffic, preventing attacks such as bot-driven scraping, credential stuffing, account takeovers, and API abuse through behavioral analysis and machine learning.

  • Global Server Load Balancer (GSLB)

    Enhances application availability and resilience by distributing traffic across multiple data centers or cloud environments, reducing latency and ensuring business continuity.

  • Threat Analytics

    Leverages AI-powered analytics to correlate security events across your application stack, filtering out false positives and highlighting critical incidents that require immediate attention.

Overview

Overview

FortiAppSec Cloud provides an all-in-one dashboard for accessing the following four subservices:

  • Web Application Firewall (WAF)

    Protects public cloud hosted web applications from the OWASP Top 10, zero day threats, and sophisticated Layer 7 attacks with adaptive security policies and real-time threat intelligence. It also integrates FortiDAST's web vulnerability scanner (WVS) in its Vulnerability Scan feature.

  • Advanced Bot Protection

    Detects and mitigates malicious automated traffic, preventing attacks such as bot-driven scraping, credential stuffing, account takeovers, and API abuse through behavioral analysis and machine learning.

  • Global Server Load Balancer (GSLB)

    Enhances application availability and resilience by distributing traffic across multiple data centers or cloud environments, reducing latency and ensuring business continuity.

  • Threat Analytics

    Leverages AI-powered analytics to correlate security events across your application stack, filtering out false positives and highlighting critical incidents that require immediate attention.