{"id":15279,"date":"2020-03-26T12:28:12","date_gmt":"2020-03-26T17:28:12","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15279"},"modified":"2025-12-19T15:23:24","modified_gmt":"2025-12-19T20:23:24","slug":"forticlient-endpoint-protection","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/","title":{"rendered":"FortiClient: Next Gen Endpoint Protection &#038; Remote Access"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15279\" class=\"elementor elementor-15279\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13bc6be e-flex e-con-boxed e-con e-parent\" data-id=\"13bc6be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8df89b elementor-widget elementor-widget-text-editor\" data-id=\"7b8df89b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Advanced Network Security, Simplified<\/h3>\n<p><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/forticlient.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet FortiClient<\/a> is purpose-built to simplify advanced security capabilities. So, even small business owners with limited IT staff or resources can roll out enterprise-grade networking. Looking to keep remote worker endpoints sanitary? FortiClient unifies all the endpoint features you expect out of a premium end user platform. Including secure remote access, sandboxing, and behavior-based scanning for ransomware and encrypted malware.<\/p>\n<p><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet<\/a> brings it together with seamless Security Fabric Integration. Ensuring that all of the Fortinet security fabric components such as <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortigate.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGate Firewalls<\/a>, <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/forti-analyzer.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiAnalyzer<\/a>, <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/forti-ap.html\" target=\"_blank\" rel=\"noopener noreferrer\">wireless APs<\/a>, and <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortiswitches.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed switches<\/a> share a unified view of every endpoint. Automated advanced threat prevention through the use of FortiSandbox catches both known and never-seen-before threats. This integrated framework is centrally managed on the single-pane-of-glass dashboard offered through a <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/fortigate.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGate next generation firewall<\/a>. It&#8217;s fast to set up, too! You&#8217;re one FortiClient download away from securing all of your endpoints, on-premises or remote. Activation codes are typically delivered next business day.<\/p>\n<h3>Remote Access with Auto-Connecting FortiClient VPN<\/h3>\n<p>With companies rushing to <a href=\"https:\/\/www.firewalls.com\/category\/secure-remote-access.html\" target=\"_blank\" rel=\"noopener noreferrer\">get remote workers set up on secure remote connections<\/a>. Many small business owners are turning to <a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/forticlient.html\" target=\"_blank\" rel=\"noopener noreferrer\">FortiClient VPN<\/a>. It takes advantage of both SSL VPN and IPSec VPN to provide secure remote access over the fastest and most stable protocol available. This means almost any Internet-connected location can offer secure access to company applications and resources, regardless of the details of its environment. It automatically connects endpoints to VPNs and maintains an always-up connection. This requires remote workers require little to no training on how to connect to a VPN from home &#8211; or anywhere else.<\/p>\n<h3>Increased Visibility &amp; Control Over Endpoints<\/h3>\n<p>FortiClient provides end-to-end visibility into all of the endpoints on a network, allowing administrators to view endpoint health at a glance. By integrating endpoints into the <a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/white-papers\/wp-security-fabric.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet Security Fabric<\/a>, the endpoint protection systems, firewall, and security services on the network communicate in real-time to ensure system compromises never go unnoticed. This translates into early detection for network administrators in case of an attack, allowing IT teams to respond quickly.<\/p>\n<p>The FortiOS 6.0 operating system enables endpoint telemetry intelligence, which accurately identifies Indicators of Compromise. They determine what constitutes an Indicator of Compromise by checking real-time web filter logs. Then, each endpoint is checked against a <a href=\"https:\/\/www.firewalls.com\/blog\/intelligence-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">threat database groomed by FortiGuard Labs<\/a>. If a potential match is flagged, Fortinet assigns a threat score to that endpoint. The threat score measures overall end user health and reporting this data back to a centrally managed dashboard through the FortiGate firewall. Plus, network administrators love the automated response capabilities that FortiClient\u2019s telemetry allows. It lets them quarantine suspicious endpoints on the fly!<\/p>\n<h3>Stop Advanced Threats Like Ransomware<\/h3>\n<p>FortiGuard Labs provides up-to-the-second threat protection based on real-world data collected from security sensors around the globe. FortiSandbox harnesses this threat intelligence for behavioral scans of all files &amp; applications present on FortiClient endpoints. That means even if threats are hidden in encrypted data packets, FortiClient will root them out and send them to quarantine before any payloads can detonate. Email-borne threats&#8211;especially dangerous to remote workers&#8211;are blunted thanks to these real-time scans and shared intelligence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e499a8 elementor-widget elementor-widget-image\" data-id=\"8e499a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1002\" height=\"560\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/atp1.png\" class=\"attachment-full size-full wp-image-15280\" alt=\"Advanced Threat Protection with FortiClient next generation endpoint\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/atp1.png 1002w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/atp1-300x168.png 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/atp1-768x429.png 768w\" sizes=\"(max-width: 1002px) 100vw, 1002px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aecb53 elementor-widget elementor-widget-spacer\" data-id=\"0aecb53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdc57e5 elementor-widget elementor-widget-text-editor\" data-id=\"bdc57e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Don\u2019t believe us that FortiClient is a next generation endpoint service? Industry validation titans such as NSS Labs and Gartner consistently stand behind this solution, providing top marks for FortiClient in annual benchmarking tests. In the <a href=\"https:\/\/www.fortinet.com\/corporate\/about-us\/newsroom\/press-releases\/2019\/fortinet-s-forticlient-blocks-100-percent-malware-in-nss-labs-20.html\" target=\"_blank\" rel=\"noopener noreferrer\">NSS Labs 2019 Advanced Endpoint Test<\/a>, Fortinet\u2019s FortiClient blocked 100% of malware thrown at it. See how to get FortiClient for your business.<\/p><p><a href=\"https:\/\/www.firewalls.com\/brands\/fortinet\/forticlient.html\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/><button class=\"btn btn-primary\">Shop FortiClient Now<\/button><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test &#038; that same next gen endpoint protection can secure your small business.<\/p>\n","protected":false},"author":5,"featured_media":27491,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[610,600],"tags":[],"class_list":["post-15279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-user-protection","category-fortinet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FortiClient: Next Gen Endpoint Protection &amp; Remote Access - Firewalls.com<\/title>\n<meta name=\"description\" content=\"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test &amp; that same next gen endpoint protection can secure your small business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FortiClient: Next Gen Endpoint Protection &amp; Remote Access - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test &amp; that same next gen endpoint protection can secure your small business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T17:28:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:23:24+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"FortiClient: Next Gen Endpoint Protection &#038; Remote Access\",\"datePublished\":\"2020-03-26T17:28:12+00:00\",\"dateModified\":\"2025-12-19T20:23:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\"},\"wordCount\":590,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png\",\"articleSection\":[\"End User Protection\",\"Fortinet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\",\"name\":\"FortiClient: Next Gen Endpoint Protection & Remote Access - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png\",\"datePublished\":\"2020-03-26T17:28:12+00:00\",\"dateModified\":\"2025-12-19T20:23:24+00:00\",\"description\":\"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test & that same next gen endpoint protection can secure your small business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png\",\"width\":1120,\"height\":630,\"caption\":\"FortiClient: Next Gen Endpoint Protection & Remote Access\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FortiClient: Next Gen Endpoint Protection &#038; Remote Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FortiClient: Next Gen Endpoint Protection & Remote Access - Firewalls.com","description":"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test & that same next gen endpoint protection can secure your small business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/","og_locale":"en_US","og_type":"article","og_title":"FortiClient: Next Gen Endpoint Protection & Remote Access - Firewalls.com","og_description":"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test & that same next gen endpoint protection can secure your small business.","og_url":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-03-26T17:28:12+00:00","article_modified_time":"2025-12-19T20:23:24+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"FortiClient: Next Gen Endpoint Protection &#038; Remote Access","datePublished":"2020-03-26T17:28:12+00:00","dateModified":"2025-12-19T20:23:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/"},"wordCount":590,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png","articleSection":["End User Protection","Fortinet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/","url":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/","name":"FortiClient: Next Gen Endpoint Protection & Remote Access - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png","datePublished":"2020-03-26T17:28:12+00:00","dateModified":"2025-12-19T20:23:24+00:00","description":"FortiClient blocked 100% of malware thrown at it in NSS 2019 Advanced Endpoint Test & that same next gen endpoint protection can secure your small business.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/FortiClient-Next-Gen-Endpoint-Protection-Remote-Access.png","width":1120,"height":630,"caption":"FortiClient: Next Gen Endpoint Protection & Remote Access"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/forticlient-endpoint-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"FortiClient: Next Gen Endpoint Protection &#038; Remote Access"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15279"}],"version-history":[{"count":20,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15279\/revisions"}],"predecessor-version":[{"id":27492,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15279\/revisions\/27492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27491"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}