Add office photos
Employer?
Claim Account for FREE
Fortinet
4.2
based on 25 Reviews
Company Overview
Company Locations
Working at Fortinet
Company Summary
Fortinet is a leader in cybersecurity, focusing on integrated network security solutions that protect organizations from evolving threats globally.
Overall Rating
4.2/5
based on 25 reviews

14% above
industry average

Highly rated for
Job security, Salary, Skill development
Work Policy

Monday to Friday
85% employees reported

Flexible timing
62% employees reported

No travel
74% employees reported

Day shift
80% employees reported
View detailed work policy
About Fortinet
Founded in2000 (25 yrs old)
India Employee Count201-500
Global Employee Count1k-5k
HeadquartersSunnyvale,California, United States
Office Locations
--
Websitefortinet.com
Primary Industry
Other Industries
Are you managing Fortinet's employer brand? To edit company information,
claim this page for free
Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.
Managing your company's employer brand?
Claim this Company Page for FREE
Fortinet Ratings
based on 25 reviews
Overall Rating
4.2/5
How AmbitionBox ratings work?
5
10
4
10
3
2
2
3
1
0
Category Ratings
4.2
Job security
4.1
Salary
4.1
Skill development
3.9
Work-life balance
3.8
Company culture
3.7
Work satisfaction
3.5
Promotions
Fortinet is rated 4.2 out of 5 stars on AmbitionBox, based on 25 company reviews. This rating reflects a generally positive employee experience, indicating satisfaction with the company’s work culture, benefits, and career growth opportunities. AmbitionBox gathers authentic employee reviews and ratings, making it a trusted platform for job seekers and employees in India.
Read more
Fortinet Reviews
Top mentions in Fortinet Reviews
Compare Fortinet with Similar Companies
Change Company | Change Company | Change Company | ||
---|---|---|---|---|
Overall Rating | 4.2/5 based on 25 reviews | 3.9/5 based on 93 reviews | 3.8/5 based on 40 reviews | 4.0/5 based on 213 reviews |
Highly Rated for | Job security Skill development Salary | Salary Work-life balance | Job security Company culture | Work-life balance Salary Company culture |
Critically Rated for | No critically rated category | Promotions | Promotions | Job security |
Primary Work Policy | - | Hybrid 71% employees reported | - | - |
Rating by Women Employees | 4.6 Excellent rated by 7 women | 4.3 Good rated by 21 women | 3.9 Good rated by 8 women | 4.1 Good rated by 51 women |
Rating by Men Employees | 3.9 Good rated by 13 men | 3.7 Good rated by 65 men | 3.8 Good rated by 28 men | 3.9 Good rated by 148 men |
Job security | 4.2 Good | 3.5 Good | 4.0 Good | 3.2 Average |
View more
Fortinet Salaries
Fortinet salaries have received with an average score of 4.1 out of 5 by 25 employees.
Technical Support Engineer
(16 salaries)
Unlock
₹5.5 L/yr - ₹16 L/yr
Software Engineer
(12 salaries)
Unlock
₹4.2 L/yr - ₹14.9 L/yr
Technical Trainer
(10 salaries)
Unlock
₹20 L/yr - ₹35 L/yr
TAC Engineer
(8 salaries)
Unlock
₹7.3 L/yr - ₹17 L/yr
Professional Services Consultant
(7 salaries)
Unlock
₹23.5 L/yr - ₹40 L/yr
Senior Technical Support Engineer
(6 salaries)
Unlock
₹16 L/yr - ₹32 L/yr
Director
(5 salaries)
Unlock
₹75 L/yr - ₹86 L/yr
Technical Account Manager
(5 salaries)
Unlock
₹21 L/yr - ₹45 L/yr
Software Development Engineer
(5 salaries)
Unlock
₹6 L/yr - ₹29.7 L/yr
Software QA Engineer
(5 salaries)
Unlock
₹9.5 L/yr - ₹18.4 L/yr
Fortinet Interview Questions
Interview questions by designation
Top Fortinet interview questions and answers
Get interview-ready with top interview questions
Fortinet Jobs
Popular Designations Fortinet Hires for
Popular Skills Fortinet Hires for
Current Openings
Fortinet News
View all
Streamlined Security: Introducing Network Security Integration
- Integrating third-party ISV security solutions into cloud environments poses challenges like network re-architecture, high costs, and compliance difficulties.
- Network Security Integration by Google Cloud addresses these challenges by enabling integration of third-party network appliances with Google Cloud workloads, ensuring consistent policies across hybrid and multicloud environments.
- It uses Geneve tunneling for secure traffic delivery to third-party inspection destinations without altering original packets.
- Network Security Integration offers out-of-band and in-band integration modes for offline analysis and inline inspection of traffic, respectively.
- Out-of-band integration helps with advanced network security, improving application performance, and meeting compliance requirements.
- In-band integration allows interception and redirection of traffic for threat inspection and adherence to security policies.
- Partners like Palo Alto Networks, Fortinet, and Corelight commend Google Cloud's Network Security Integration for enhancing security capabilities.
- The integration with partners like Trellix, cPacket, and NETSCOUT further strengthens security measures for cloud deployments.
- Google Cloud emphasizes the importance of an integrated security ecosystem for enhanced visibility and security of network traffic and workloads.
- Network Security Integration empowers customers to use third-party security solutions in cloud environments cost-effectively, with seamless integration and increased compliance.
Cloudblog | 13 Mar, 2025

How to Evaluate Comprehensive Cybersecurity Solutions
- Comprehensive cybersecurity solutions offer extensive protection against various cyber threats, including network and cloud security, endpoint protection, and advanced breach detection capabilities.
- Evaluating these solutions involves prioritizing key factors that align with your organization's security needs and considering customer feedback on popular platforms for valuable insights.
- Key features of a comprehensive cybersecurity solution include cloud security, network security, endpoint protection, threat intelligence, incident response, scalability, and integration with existing systems.
- Cloud security is crucial for safeguarding data in cloud environments, requiring tools like encryption, IAM, and monitoring to protect against unauthorized access and data breaches.
- Network security involves protecting network infrastructure from unauthorized access and attacks using measures like firewalls, IPS, VPNs, and segmentation to detect and block malicious activities.
- Endpoint protection secures individual devices against malware, ransomware, and other cyber threats, minimizing the risk of breaches and ensuring regulatory compliance.
- Best practices for evaluating cybersecurity solutions include defining clear requirements, establishing evaluation criteria, conducting PoCs, assessing integration capabilities, ensuring scalability and flexibility, and gathering peer references.
- By following these best practices, organizations can select comprehensive cybersecurity solutions that align with their security, operational, and business requirements.
- Top vendors offering comprehensive cybersecurity solutions, like Palo Alto Networks, Check Point, Fortinet, CrowdStrike, Sophos, and Trend Micro, provide features such as unified security, centralized management, and scalability.
- Evaluations of these vendors highlight benefits like improved threat detection and response, simplified management, scalability, and enhanced security posture, aiding organizations in making informed decisions.
Hackernoon | 13 Mar, 2025

Expired Juniper routers find new life – as Chinese spy hubs
- Chinese spies have exploited old Juniper Networks routers, infecting them with custom backdoors and gaining root access.
- The affected routers were running end-of-life hardware and software, prompting Juniper to issue a patch to fix the issue.
- A China-nexus espionage group known as UNC3886 has been exploiting a Junos OS vulnerability since mid-2024.
- The group targets defense, technology, and telecommunication organizations in the US and Asia.
- Mandiant discovered the backdoors injected by UNC3886, allowing access to victim networks.
- The group has exploited critical VMware and Fortinet vulnerabilities in the past.
- UNC3886 focuses on long-term network access, using malware like TINYSHELL backdoor on Juniper routers.
- The spies gain privileged access through legitimate credentials, bypassing security measures like veriexec.
- Six distinct malware samples were identified across multiple Juniper MX routers, each with unique capabilities.
- UNC3886 has shifted focus to targeting internal networking infrastructure, including ISP routers.
The Register | 12 Mar, 2025

Fortinet identifies thousands of malicious software packages exploiting open-source repositories
- A new report from FortiGuard Labs highlights a wave of malicious software packages exploiting system vulnerabilities.
- The report identifies thousands of malicious packages distributed across open-source repositories, using techniques such as low-file-count packages, suspicious installation scripts, and typosquatting.
- Attackers employ deceptive tactics, including artificially high version numbers and empty descriptions, to obscure their true intent and mislead users.
- Fortinet urges organizations to implement strong security hygiene, vet open-source dependencies, utilize threat intelligence solutions, and apply behavioral analysis techniques.
Siliconangle | 10 Mar, 2025

Terraform 1.11 brings ephemeral values to managed resources with write-only arguments
- HashiCorp Terraform 1.11 is now available, featuring write-only arguments for managed resources.
- Write-only arguments allow the use of ephemeral values in specific resource arguments, enhancing security.
- Terraform 1.10 introduced ephemeral values for handling sensitive data, and 1.11 extends this to managed resources.
- With write-only arguments, values can only be written to and not read, adding an extra layer of security.
- By using write-only arguments, secrets like passwords can be securely passed to resources without being exposed in artifacts.
- Examples of write-only arguments are master_password_wo in AWS resources and administrator_password_wo in Azure resources.
- Upgrades to Terraform tests include new features like state_key attribute, mocked values during unit tests, and JUnit XML test reports.
- Users can download Terraform 1.11, sign up for HCP Terraform, and explore tutorials for upgrading RDS major versions.
- Partners like Juniper, Palo Alto Networks, and Fortinet are commended for adopting ephemeral values for enhanced security.
- The community's feedback and contributions played a vital role in shaping Terraform 1.11. Thanks to all contributors.
Hashicorp | 4 Mar, 2025

How our partners are enhancing CSP operations with AI solutions
- Google Cloud has been supporting telecommunications innovation by fostering a partner ecosystem to meet the constant evolution of communication service providers (CSPs).
- Partners are using AI to help CSPs optimize network performance, personalize customer experiences, automate operations, and identify new revenue streams.
- AI enables CSPs to move from reactive to proactive network management, with predictive maintenance, automated troubleshooting, and real-time optimization.
- Partners like Amdocs, Ericsson, Fortinet, MATRIXX, and Nokia are collaborating with Google Cloud to enhance various aspects of CSP operations with AI solutions.
- Tools like BigQuery, Looker, Vertex AI are helping partners optimize IT transformation and productivity for telecom companies.
- Partners are enhancing the customer experience for CSPs using AI to understand customer needs, personalize interactions, and provide proactive support.
- AI plays a vital role in optimizing pricing strategies, personalizing offers, and automating billing processes, creating effective monetization models.
- Services partners like Accenture, Capgemini, and TCS are helping CSPs implement AI projects and transform with Google Cloud technology.
- AI is also assisting telecom organizations in optimizing energy consumption, reducing waste, and minimizing their carbon footprint.
- Google Cloud aims to empower the telecom industry to embrace digital transformation with the help of its partners, shaping the future of connectivity.
Cloudblog | 27 Feb, 2025

Twin Google flaws allowed attacker to get from YouTube ID to Gmail address in a few easy steps
- A security researcher discovered two Google vulnerabilities that allowed leaking the email addresses of YouTube channels, despite Google's privacy promises.
- By exploring Google's People API and Pixel Recorder, the researcher identified a method to expose email addresses associated with Gaia IDs.
- Google recognized the severity of the vulnerabilities and awarded the researcher a bug bounty for reporting the flaws.
- Fortinet's FortiOS was found to have a critical vulnerability that could escalate privileges for an authenticated administrator.
- The Kraken ransomware gang claimed to have targeted Cisco and leaked sensitive data, prompting a response from Cisco.
- The DOGE Department of Government Efficiency built a questionable website that allowed unauthorized changes, raising security concerns.
- Zacks Investment Research suffered a data breach affecting 12 million users, leading to the exposure of personal information and password hashes.
- The FBI announced its success in preventing over 4,300 individuals in the US from falling victim to cryptocurrency investment scams, saving them $285 million.
- The FBI's Operation Level Up focuses on educating potential scam victims and utilizing sophisticated techniques to identify and prevent fraudulent activities.
- The FBI continues its efforts to combat evolving scams and protect US citizens from financial fraud schemes.
The Register | 17 Feb, 2025

Major Russian hacking group shifts focus to US and UK targets
- Russian hacking group 'Seashell Blizzard' expands its targets to the US and UK in its 'BadPilot' campaign.
- The group leverages opportunistic access techniques to compromise networks and collect credentials.
- Seashell Blizzard targets ConnectWise ScreenConnect IT remote management software and Fortinet FortiClient EMS security software.
- Microsoft's Threat Intelligence Report suggests the group will continue to innovate and expand its techniques to support Russia's war objectives.
Tech Radar | 13 Feb, 2025

February's Patch Tuesday sees Microsoft offer just 63 fixes
- Microsoft's February Patch Tuesday includes 63 fixes, with two already being exploited requiring local authentication.
- Vulnerabilities like CVE-2025-21418 and CVE-2025-21391 pose risks of privilege escalation and file deletion.
- Known issues such as CVE-2025-21194 and CVE-2025-21377 affecting Surface devices and NTLMv2 hash leakage are highlighted.
- Microsoft warns of critical flaws like CVE-2025-21198 enabling remote code execution in high-performance computing infrastructure.
- Excel receives critical patches for remote code execution, urging attention to CVE-2025-21379 in the DHCP Client Service.
- Changes to certificate-based authentication on domain controllers by February 11 require reconfiguration for compatibility.
- Adobe contributes 45 patches, focusing on Adobe Commerce vulnerabilities, while SAP and Fortinet also release security updates.
- Adobe InDesign, Illustrator, Substance 3D, InCopy, and Photoshop receive critical or important bug fixes for code execution and privilege escalation.
- SAP patches range from cross-site scripting issues in NetWeaver to critical authentication bypass vulnerabilities in FortiOS and FortiProxy.
- Fortinet addresses a critical vulnerability with a CVSS score of 9.6 in FortiOS and FortiProxy, emphasizing the importance of prompt application.
The Register | 12 Feb, 2025

Attackers exploit a new zero-day to hijack Fortinet firewalls
- Fortinet warned of attacks using a now-patched zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet firewalls.
- The vulnerability is an authentication bypass issue that could allow a remote attacker to gain super-admin privileges.
- Fortinet provides temporary mitigation by disabling the HTTP/HTTPS administrative interface or limiting access via local-in policies.
- Arctic Wolf researchers observed a four-phase campaign involving unauthorized logins, account creation, and config changes on Fortinet firewalls.
Securityaffairs | 12 Feb, 2025

Powered by
Fortinet Offices
Compare Fortinet with

Cisco
4.1

FireEye
4.3

McAfee
4.0

Trend Micro
4.3

Juniper Networks
4.2

Pulse Secure
3.7

SonicWALL
3.5

Magic Edtech
3.1

VDart
4.0

Value Point Systems
3.6

JoulestoWatts Business Solutions
2.9

Saama Technologies
3.7

DISYS
3.0

MMC Infotech Services
3.6

Data-Core Systems
3.1

Arvato
3.5

Eastern Software Systems
3.8

JMR Infotech
4.2

11:11 Systems
3.8

Zen3 Info Solutions
4.1
Edit your company information by claiming this page
Contribute & help others!
You can choose to be anonymous
Companies Similar to Fortinet

Palo Alto Networks
Hardware & Networking, IT Services & Consulting
3.9
• 93 reviews

Check Point Software Technologies
Hardware & Networking, Software Product
3.8
• 40 reviews

Trend Micro
Internet, Hardware & Networking, Software Product
4.3
• 29 reviews

Juniper Networks
Internet, Hardware & Networking, IT Services & Consulting
4.2
• 413 reviews

Pulse Secure
Hardware & Networking, IT Services & Consulting, Software Product
3.7
• 11 reviews

SonicWALL
Law Enforcement & Security, Hardware & Networking, Software Product
3.5
• 60 reviews

Magic Edtech
Internet, EdTech, IT Services & Consulting, Software Product
3.1
• 472 reviews

VDart
IT Services & Consulting
4.0
• 121 reviews
Fortinet FAQs
When was Fortinet founded?
Fortinet was founded in 2000. The company has been operating for 25 years primarily in the IT Services & Consulting sector.
Where is the Fortinet headquarters located?
Fortinet is headquartered in Sunnyvale,California.
How many employees does Fortinet have in India?
Fortinet currently has approximately 200+ employees in India.
Does Fortinet have good work-life balance?
Fortinet has a Work-Life Balance Rating of 3.9 out of 5 based on 20+ employee reviews on AmbitionBox. 80% employees rated Fortinet 4 or above, while 20% employees rated it 3 or below on work-life balance. This indicates that the majority of employees feel a generally balanced work-life experience, with some opportunities for improvement based on the feedback. We encourage you to read Fortinet work-life balance reviews for more details
Is Fortinet good for career growth?
Career growth at Fortinet is rated fairly well, with a promotions and appraisal rating of 3.5. 80% employees rated Fortinet 4 or above, while 20% employees rated it 3 or below on promotions/appraisal. Though the sentiment is mixed for career growth, majority employees have rated it positively. We recommend reading Fortinet reviews for more detailed insights.
What are the pros of working in Fortinet?
Working at Fortinet offers several advantages that make it an appealing place for employees. The company is highly rated for job security, salary & benefits and skill development, based on 20+ employee reviews on AmbitionBox.
Stay ahead in your career. Get AmbitionBox app
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+
Reviews
5 Lakh+
Interviews
4 Crore+
Salaries
1 Cr+
Users/Month
Contribute to help millions
Get AmbitionBox app