Simplifying Operations With The Fortinet Security Fabric and FortiAnalyzer
Simplifying Operations With The Fortinet Security Fabric and FortiAnalyzer
Executive Summary
Cybersecurity teams worldwide are struggling with the growing sophistication
and volume of cybercriminal attacks. And as their organizations’ networks evolve
and expand, their siloed point products add complexity, manual processes, and
fragmentation to security operations—which, of course, prevents timely detection
FortiAnalyzer, combined
of threats and stopping intrusions.
with the Fortinet Security
Contributing factors to the current dysfunction in many security operations include: Fabric, provides a solution
n Too many siloed point products with lack of integration to address current
difficulties and strengthen
n High data and alert volume, producing security noise security posture.
n Repetitive manual processes, slowing responses
n The lack of cybersecurity personnel and expertise
To address these factors and improve their security operations, teams at leading organizations are implementing a vendor
consolidation and automation strategy—and turning to Fortinet for industry-leading solutions.
With advanced logging and reporting capabilities, FortiAnalyzer centralizes security analytics across the Fortinet Security
Fabric and provides security automation via Fabric Connectors and application programming interfaces (APIs). It also
includes easy-to-implement security workflow automation to accelerate operations.
These unique features enable an organization to maximize the impact and effectiveness of a lean security team without
extensive configuration. FortiAnalyzer, a core part of the Security Fabric, force multiplies teams, simplifies security
operations, and allows enterprises at any stage of security operations center (SOC) maturity to smoothly integrate security
visibility and automation.
1
SOLUTION BRIEF | Simplifying Operations With the Fortinet Security Fabric and FortiAnalyzer
Step 3
FortiAnalyzer is the unified logging and reporting solution for all these projects across the enterprise. Organizations also need
customizable reporting and tools that help demonstrate compliance to auditors or leadership. Fortinet compliance reporting
is supported via FortiAnalyzer and includes prebuilt reports for standards such as the Payment Card Industry Data Security
Standard (PCI DSS), Suspicious Activity Report (SAR), Center for Internet Security (CIS), and more.
Also, FortiAnalyzer provides audit logging and role-based access control (RBAC) to ensure segmentation of data and processes
for employees to only access the information they need to perform their duties.
2
SOLUTION BRIEF | Simplifying Operations With the Fortinet Security Fabric and FortiAnalyzer
Risk scoring is used to prioritize the identified anomalies and share this threat intelligence across the Security Fabric. The
Security Fabric analytics engine also powers visualization of the Security Fabric in real time. These visualizations allow members
of the IT, security, and SOC teams to immediately identify and investigate potential threats to the network. FortiAnalyzer comes
with easily customized built-in dashboards and reports.
Over 800 datasets are included in FortiAnalyzer to enable easy onboarding to reporting and dashboards. These include
advanced queries that are optimized for quick responses in real time.
Automation and AI
Automation and security artificial intelligence (AI), when fully deployed, provide the biggest cost mitigation—not only around
filling the cybersecurity skill shortage gap, but also costs associated with breaches due to the weaponization of AI and
persistent cyberattacks.
FortiAnalyzer includes built-in automation through the FortiSOC module. This module comes with playbooks and connectors for
the Security Fabric. This is can be used as an organization’s foundation to the SOC Maturity Model to take advantage of security
automation. Automation can originate in FortiOS via Automation Stitches, which uses FortiAnalyzer as an advanced correlation
engine. This process defines detailed event handlers and plugs in to the FortiOS IFTTT (if this, then that) technology to optimize
response times.
Automation can also be triggered via FortiAnalyzer, supporting integration with third-party solutions, such as IT service management
(ITSM), security information and event management (SIEM), and webhook, or via the Security Fabric using native connectors.
3
SOLUTION BRIEF | Simplifying Operations With the Fortinet Security Fabric and FortiAnalyzer
Figure 4: FortiAnalyzer enables centralized automation of security infrastructure via the Security Fabric.
1
FortiGuard Labs, 2021.
www.fortinet.com
Copyright © 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
618026-A-0-EN