Senior Executive ICT at Razak School of Government
Real User
Top 10
2024-07-17T08:23:22Z
Jul 17, 2024
If I speak about the threat intelligence from Fortinet FortiGuard and its impact on your security responses, I would say that everything in the tool is based on the latest signatures, and the support team is also efficient. Most of the rules run properly with the tool. It is easy to use the tools and integration features and to implement them. The interface is quite user-friendly and easy to manage, and it is also easy to segment the rules and the actions that need to be taken. In the area of segmentation and security against vulnerabilities, based on the application, the IP address, and the source or destination is something that is enough for us. I can maintain and provide support for the product in our company. Only some specific updates need to be made to the product. We can manage the tool, and right now, it is working okay for us. I can't remember if the product provides any AI features to users. Some AI features are offered by the tool for the rules or anything that is based on the device itself. I rate the tool an eight out of ten.
Threat Intelligence Platforms offer organizations tools to identify, assess, and manage cyber threats efficiently. They integrate with existing security systems, enhancing threat detection and response capabilities to ensure robust cybersecurity defenses.These platforms aggregate and analyze threats from numerous sources, providing valuable insights into potential vulnerabilities and attack vectors. They are essential for organizations looking to streamline their cybersecurity efforts by...
If I speak about the threat intelligence from Fortinet FortiGuard and its impact on your security responses, I would say that everything in the tool is based on the latest signatures, and the support team is also efficient. Most of the rules run properly with the tool. It is easy to use the tools and integration features and to implement them. The interface is quite user-friendly and easy to manage, and it is also easy to segment the rules and the actions that need to be taken. In the area of segmentation and security against vulnerabilities, based on the application, the IP address, and the source or destination is something that is enough for us. I can maintain and provide support for the product in our company. Only some specific updates need to be made to the product. We can manage the tool, and right now, it is working okay for us. I can't remember if the product provides any AI features to users. Some AI features are offered by the tool for the rules or anything that is based on the device itself. I rate the tool an eight out of ten.