Skip to content Skip to navigation Skip to footer

Overview

The FortiScanner CAASM cloud-service provides comprehensive visibility into corporate networks, identifying security gaps by merging asset, software, and vulnerability data. This allows security operations teams to proactively minimize threats and protect against attacks by identifying weaknesses and misconfigurations.

FortiScanner Dashboard UI

Comprehensive Visibility

FortiScanner Cloud provides comprehensive security visibility across corporate networks, identifying security gaps in both managed and unmanaged systems. Through a dashboard accessible from anywhere, it allows you to view device health and status. FortiScanner Cloud consolidates asset, network, user, software, and vulnerability data to identify weaknesses and protect against potential attacks.

FortiScanner Inventory UI

Easy-to-Read and Searchable Device Inventories

FortiScanner Cloud provides easily readable and searchable device inventories, allowing you to drill down into asset details, including vulnerabilities, software, services, and screenshots. Reports enable users to quickly identify compromised assets with high vulnerabilities and offer additional information such as the switch and port the device is connected to.

FortiScanner Scans UI

Customizable Scans

Users can configure scan intervals, defining each scan setup by site and subnet, with scan rates adjustable hourly, daily, weekly, or monthly. Scanning against servers (SSH, SNMP, Telnet, VMware) is performed using provided authentication credentials. The system then collects information about the system, applications, and software running, correlating this data with vulnerability analysis. Based on the FortiCloud AMI, multi-tenant accounts are supported. Detectors, which require one per subnet, discover assets, vulnerabilities, software, and services. User-installed detectors support Windows, Linux, and MacOS.

Features and Benefits

Increased visibility

Performs active scanning and passive discovery with no impact to devices or the network

Posture Assessment

Identifies systems lacking security measures or absent from vulnerability management programs

Exposure management

Protects against potential threats by identifying weaknesses, misconfigurations, and hazards

FortiScanner Use Cases

Compliance icon
Governance, Risk, and Compliance
Helps companies adopt GRC frameworks, identify security vulnerability risks, and establish policies and practices to minimize compliance risks.
icon assets
Asset inventory
Discovers all network devices (physical and virtual) and their applications and services.
icon webscraping
Vulnerability Detection
Correlates assets, applications, and vulnerabilities, classifies vulnerability lists, and mitigates compliance risk.

Resources

Data Sheets