The drastic increase in mobile devices, some of which are the private property of the users, presents companies with a new dimension of challenges: Control over devices to which, due to the legal situation, no or only very limited and, above all, regulated access is possible. But even if the end devices are company property, secure control is often only possible to a limited extent (e.g. the iOS of the Apple world offers hardly any possibilities to install security software). Here, central mechanisms must provide decentralised security.

  • Device and OS detection: As of FortiOS 5, all FortiGate appliances provide extensive functions for this purpose. Thus, the end devices (type & manufacturer) as well as the installed operating systems (type & release) can be detected on the basis of special parameters. In conjunction with geographical location, user recognition and authentication and, if necessary, other key data (time, data volume, resources, etc.), individual sets of rules are possible that can be used depending on these framework parameters.