Overview: 
      Uptime is a mandate for today’s digital business and end users do not care if their application problems are performance or security-related. That’s where FortiSIEM comes in.
      Unified NOC and SOC Analytics (Patented)
      Fortinet has developed an architecture that enables unified data collection and analytics from diverse information sources including logs, performance metrics, SNMP Traps, security alerts, and configuration changes. FortiSIEM essentially takes the analytics traditionally monitored in separate silos — SOC and NOC — and brings that data together for a comprehensive view of the security and availability of the business. Every piece of information is converted into an event which is first parsed and then fed into an event-based analytics engine for monitoring real-time searches, rules, dashboards, and ad-hoc queries.
      Machine Learning / UEBA
      FortiSIEM uses Machine Learning to detect unusual user and entity behavior (UEBA) without requiring the Administrator to write complex rules. FortiSIEM helps identify insider and incoming threats that would pass traditional defenses. High fidelity alerts help prioritize which threats need immediate attention.
		User and Device Risk Scoring
		FortiSIEM build a risk scores of Users and Devices that can augment UEBA rules and other analysis. Risk scores are calculated by combining several datapoints regarding the user and device. The User and Device risk scores are displayed in a unified entity risk dashboard.
      Highlights
      
		   - Cross Correlation of SOC &  NOC Analytics
- Real-Time Network Analytics
- Security and Compliance out-of-the-box
- Single IT Pane of Glass
- Cloud Scale Architecture
- Self Learning Asset Inventory (CMDB)
- Multi-tenancy
- MSP/MSSP Ready
- Available as a virtual or  physical appliance

     
    
      Highlights:
      
      Distributed Real-Time Event Correlation  (Patented)
      Distributed event correlation is a difficult problem, as multiple nodes  have to share their partial states in real time to trigger a rule. While  many SIEM vendors have distributed data collection and distributed  search capabilities, Fortinet is the only vendor with a distributed  real-time event correlation engine. Complex event patterns can be  detected in real time. This patented algorithm enables FortiSIEM to  handle a large number of rules in real time at high event rates for  accelerated detection timeframes. 
      Real-Time, Automated Infrastructure Discovery  and Application Discovery Engine (CMDB)
      Rapid problem resolution requires infrastructure context. Most log  analysis and SIEM vendors require administrators to provide the  context manually, which quickly becomes stale, and is highly prone  to human error. Fortinet has developed an intelligent infrastructure  and application discovery engine that is able to discover and map  the topology of both physical and virtual infrastructure, on-premises  and in public/private clouds, simply using credentials without any  prior knowledge of what the devices or applications are.
      An up-to-date CMDB (Centralized Management Database) enables  sophisticated context aware event analytics using CMDB Objects in  search conditions. 
      Dynamic User Identity Mapping
      Crucial context for log analysis is connecting network identity  (IP address, MAC Address) to user identity (log name, full name,  organization role). This information is constantly changing as users  obtain new addresses via DHCP or VPN.
      Fortinet has developed a dynamic user identity mapping methodology.  Users and their roles are discovered from on-premises or Cloud SSO repositories. Network identity is identified from important  network events. Then geo-identity is added to form a dynamic user  identity audit trail. This makes it possible to create policies or  perform investigations based on user identity instead of IP  addresses — allowing for rapid problem resolution.  
      Flexible and Fast Custom Log Parsing  Framework (Patented) 
      Effective log parsing requires custom scripts but those can be slow  to execute, especially for high volume logs like Active Directory,  firewall logs, etc. Compiled code on the other hand, is fast to  execute but is not flexible since it needs new software releases.  Fortinet has developed an XML-based event parsing language that  is functional like high level programming languages and easy to  modify yet can be compiled during run-time to be highly efficient.  All FortiSIEM parsers go beyond most competitor’s offerings using  this patented solution and can be parsed at beyond 10K EPS per  node.
      Business Services Dashboard — Transforms  System to Service Views
      Traditionally, SIEMS monitor individual components — servers,  applications, databases and so forth — but what most  organizations really care about is the services those systems power.  FortiSIEM now offers the ability to associate individual components  with the end user experience that they deliver together providing a  powerful view into the true availability of the business. 
      
      Automated Incident Mitigation
      When an Incident is triggered, an automated script can be run to  mitigate or eliminate the threat. Built-in scripts support a variety of  devices including Fortinet, Cisco, Palo Alto and Window/Linux  servers. Built-in scripts can execute a wide range of actions including  disabling a user’s Active Directory account, disabling a switch port,  blocking an IP address on a Firewall, deauthenticating a user on a  WLAN Access Point, and more. Scripts leverage the credentials  FortiSIEM already has in the CMDB. Administrators can easily  extend the actions available by creating their own scripts.
      Infusion of Security Intelligence
      FortiGuard Threat Intelligence and Indicators of Compromise (IOC)  and Threat Intelligence (TI) feeds from commercial, open source  and custom data sources integrate easily into the security TI  framework. This grand unification of diverse sources of data  enables organizations to rapidly identify root causes of threats, and  take the steps necessary to remediate and prevent them in the  future. Steps can often be automated with new Threat Mitigation  Libraries for many Fortinet products. 
      Large Enterprise and Managed Service  Provider Ready — “Multi-Tenant Architecture”
      Fortinet has developed a highly customizable, multi-tenant architecture that enables enterprises and service providers to
manage a large number of physical/ logical domains and over-lapping systems and networks from a single console. In this
environment it is very easy to cross-correlate information across physical and logical domains, and individual customer
networks. Unique reports, rules, and dashboards can easily be built for each, with the ability to deploy them across a wide set
of reporting domains, and customers. Event archiving policies can also be deployed on a per domain or customer basis. Granular
RBAC controls allow varying levels of access to Administrators and Tenants/ Customers. For large MSSPs, Collectors can be
configured as multi-tenant to reduce the overall deployment footprint. 
     
	
      FortiSIEM Advanced Agents:
      Fortinet has developed a highly efficient agentless technology  for collecting information. However some information, such as  file integrity monitoring data, is expensive to collect remotely.  FortiSIEM has combined its agentless technology with high  performance agents for Windows and Linux to significantly bolster  its data collection.
      
        
          |  | Agentless Technology | Advanced Windows Agent | Advanced Linux Agent | 
        
        
          | Discovery |  |  |  | 
        
          | Performance Monitoring |  |  |  | 
        
          | (Low Performance) Collect System,  App & Security Logs |  |  |  | 
        
        
          | (High Performance) Collect System,  App & Security Logs |  |  |  | 
        
          | Collect DNS, DHCP, DFS, IIS Logs |  |  |  | 
        
          | Local Parsing and Time Normalization |  |  |  | 
        
          | Installed Software Detection |  |  |  | 
        
          | Registry Change Monitoring |  |  |  | 
        
          | File Integrity Monitoring |  |  |  | 
        
          | Customer Log File Monitoring |  |  |  | 
        
          | WMI Command Output Monitoring |  |  |  | 
        
          | PowerShell Command Output Monitoring |  |  |  | 
		   
          | Central Management and Upgrades of Agent |  |  |  |