FortiADC enhances the scalability, performance, and security of your applications whether they are hosted on premises or in the cloud. FortiADC is an advanced application delivery controller that optimizes application performance and availability while securing the application both with its own native security tools and by integrating application delivery into the Fortinet Security Fabric.
FortiADC provides unmatched application acceleration, load balancing, and web security, regardless of whether it is used for applications within a single data center or serves multiple applications for millions of users around the globe. FortiADC includes application acceleration, WAF, IPS, SSLi, link load balancing, and user authentication in one solution to deliver availability, performance, and security in a single, all-inclusive license.
Enterprise-class layer 4-7 ADC
High-performance physical and virtual ADC and reverse proxy. Includes advanced functions like intelligent traffic management and acceleration, server and application health monitoring, SSL acceleration and offloading, caching/compression, TCP multiplexing, an automation-enabled API, Link Load Balancing and WAN Optimization, sophisticated scripting and more.
Disaster recovery with global server load balancing
Available as a Service or as a FortiADC feature, FortiGSLB is a DNS-based solution that enables you to deploy redundant resources around the globe with near instant fail-over when one resource experiences unexpected traffic spikes or downtime. FortiGSLB provides comprehensive DNS services including Domain Name System Security Extensions, and rate limiting.
Deep integration into the Fortinet Security Fabric
FortiADC's deep integration into the Fortinet Security Fabric allows security and traffic data to be shared, allowing identification and analysis of multi-pronged security threats. Automation stiches allow threats identified by FortiADC to be remediated by FortiGate. And FortiADC's SSLi capability along with antivirus and integration with FortiSandbox allow files to be decrypted, scanned, and re-encrypted before they reach the end user - detecting both known and unknown threats.