How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We're a service provider. Our clients use the solution for log management. We are using physical and virtual end ware. We have a physical and logical virtual environment for using this platform, which we provide to our customers.
We use this solution for reporting. We also use it to keep logs for our clients that require logs with a history of more than seven days. In addition to our own firewalls, we have several clients with firewalls that report into the same FortiAnalyzer. We have a private cloud deployment, set up on-premises.
Our primary use case of this solution is to deep-dive and get deep visibility analyzing of logs and proxy of the network. In other words, to get good customized reports.
We use the analyzer for reporting, to know what exactly is happening on the network. We use it to see which accesses are granted, which accesses are denied, which sites are visited, which botnets are coming in, which viruses, etc. The solution is on-premise. Most of the time we set it up on the client's premises, depending on their needs. The cloud is there for testing.
We primarily use the solution to protect the network and to control how the users access and use the internet.
We use the on-prem deployment model of this solution. My primary use case for this solution is for log collection. I have a lot of FortiGates that I have to collect logs from, so I primarily use it for log collection. We plan to deploy a SIEM and we want to try to see how to integrate all the solutions to our SIEM. We are processing for PCI data specifications. We have to respond to PCI requirements, so that's why we are making some changes and acquiring some new security solutions to deploy. Among them, we have FortiSIEM and other security solutions like antivirus.
Our primary use case of this solution is for bandwidth. We are very satisfied with this program.
This solution is mainly used for reporting. We collect data from the FortiGate and analyze it with this appliance. We have a physical device that is deployed on-premises.
It receives logs from the FortiGate 5000 Series (about 12 FortiGate blades), and it was configured for keep logs for about 1,050 days. The logs are divided by archive (raw logs) and analytics (logs indexed in a database). The use case is primarily for getting graphical data to make quick decisions.