Fortinet Security Operations Solutions Use AI for quick responses


Fortinet announced the results of an independent analysis by Enterprise Strategy Group (ESG) to quantify the customer benefits of deploying security operations solutions from Fortinet. The analysis determined that customers dramatically improved detection, containment, investigation, and response while making security teams up to 86% more operationally efficient. Organizations reduced cyber risk, improved productivity, and enabled existing teams to do more in less time. And all of these improvements come with an investment payback period of as little as one month.

The Quantified Benefits of the Fortinet SecOps Fabric

The foundation of the ESG analysis was in-depth interviews with end-users, during which they established the time it took each organization to handle critical security operations functions, such as the time to detect, validate, and contain incidents as well as the time to fully investigate and remediate them. Together with technical documentation, existing case studies, third-party analyses, and industry data, ESG was then able to establish qualitative and quantitative benchmarks around these functions, especially potential risk, time, and cost savings the average organization should expect.

According to the ESG analysis, organizations that implemented Fortinet Security Operations solutions realized significant savings and benefits in three areas: 

  • Early detection and prevention (EDP): The time to identify threats was reduced from 168 hours (21 business days), if detected at all, to less than an hour and often only seconds using Fortinet EDP technologies, which include FortiEDR, FortiDeceptor, FortiRecon, FortiSandbox, and FortiNDR that use artificial intelligence (AI) and other advanced behavioral analytics. The time to triage these threats was reduced from eight hours to 10 minutes, and the time to contain them dropped from 4.2 hours to one minute based on Fortinet’s integrated approach.
  • Central analytics and response automation (CARA): The time to investigate threats dropped from 6 hours to 1 minute (or less) using the insight and automation of Fortinet CARA components, which include FortiAnalyzer, FortiSIEM, FortiXDR, FortiSOAR, and managed detection and response services. More importantly, the time to remediate those threats was reduced from 12.5 hours to 5-10 minutes in most cases. 
  • Training and preparation: End-user and analyst training from Fortinet reduced risks from phishing attacks and improved incident readiness and response, which resulted in fewer security team hours spent responding to incidents. One customer estimated the number of people that clicked on harmful links dropped by 84%. Additionally, cybersecurity professional education led to faster onboarding and increases in security team productivity, efficiency, and capabilities.

Operational Savings from Fortinet Technologies

Beyond the accelerated time to detect, contain, investigate, and respond to incidents, ESG modeled the expected operational savings related to security team productivity reported by participants. Results showed that Fortinet EDP technologies could reduce the average time spent per incident by 86%, avoiding the expenditure of $993,000 per year to accomplish the same amount of work. And adding Fortinet CARA technologies could result in a 99% time savings, avoiding $1.14 million in annual operational cost.

In the report, ESG also predicts that Fortinet products can reduce the average time exposed to risk by 97% with EDP and 99% with both EDP and CARA, helping organizations avoid an expected cost of cyberattacks by an average of $1.3 million. 

Combining the improved productivity and costs with the risk avoidance savings leads to a payback period of 1 to 2.5 months for Fortinet EDP and 1 to 1.7 months for the combination of EDP and CARA.

Automating Security Operations

The Fortinet SecOps Fabric applies artificial intelligence, machine learning, and integration across the expanded digital attack surface with distributed security controls that span network, endpoint, application, and cloud that detect components and activity designed to bypass traditional security and hide among legitimate operations. At the same time, a centralized approach to broader investigation and response speeds an organization’s return to safe operation.