The FortiAnalyzer-100C appliance securely aggregates, analyzes, and reports on log data from gathered from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, you can filter and review records, including traffic, event, virus, attack, Web content, and email data—mining the data to determine your organization’s security stance and assure regulatory compliance.
The FortiAnalyzer-100C appliance also provides advanced security management functions such as quarantined file archiving, event correlation, network vulnerability assessments, traffic analysis, and archiving of email, Web access, instant messaging, and file transfer content.
- Log Performance (Logs / Sec) Up to 200
- Data Receive Rate Up to 800 Kbps
- Number of Devices Supported Up to 100
- Number of FortiClient Agents Supported Up to 100
- FortiGate models supported All
FortiAnalyzer drills deep and provides the granular level of reporting necessary to really understand what is happening on your network. Historically, or in real-time, view log and content information, analyze network traffic and utilize advanced Forensic Analysis to track user activities down to the content level.

Benefits
- Secure data aggregation from multiple FortiGate and FortiMail security appliances provides network-wide visibility.
- Over 300 customizable graphical reports help monitor and maintain acceptable use policies, identify attack patterns, and comply with governmental regulations regarding privacy and disclosure of security breaches.
- Network capacity and utilization reporting enables network administrators to plan and manage networks more efficiently.
- Fully integrated with FortiManager appliances for a single point of command, control, analysis, and reporting.
- FortiGuard subscription services deliver dynamic updates to vulnerability and compliance management functionality through intelligence gathered by Fortinet’s dedicated global threat research team.
- Advanced features such as event correlation, forensic analysis, and vulnerability assessment provide essential tools for in-depth protection of complex networks.
- 1TB of on-device log data capacity with additional data archiving capabilities allow administrators to retain data according to regulatory policies.