Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Fortinet, your compliance team needs documented proof they can be trusted. ThirdProof investigated Fortinet across 27 intelligence sources — here's what we found.
⚠ FedRAMP Status: Not found in the FedRAMP Marketplace. Vendors handling government data or CUI must be FedRAMP authorized.
24 sources queried. 97% confidence. Every Fortinet investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Fortinet's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 35% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q38
ISO 27001 claim found on trust page (Vendor attested)
Q41
Not found in FedRAMP marketplace
Q40
HIPAA compliance / BAA claim found on trust page (Vendor attested)
Q42
GDPR compliance / DPA claim found on trust page (Vendor attested)
+ 3 more compliance questions answered in the full report
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Fortinet's Full Report Free →Verified against FedRAMP Marketplace API as of March 2026
Organizations with federal compliance requirements should verify this directly at marketplace.fedramp.gov.
Fortinet is not listed on the FedRAMP Marketplace.
Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
24
Sources Queried
23
Sources With Data
March 25, 2026
Last Assessed
AI-generated analysis for Fortinet
Fortinet, Inc. (fortinet.com) is a well-established cybersecurity vendor incorporated in Delaware and actively registered as a legal entity with an LEI. The rule engine has assigned a Tier 3 (Moderate Risk) rating with 97% confidence, reflecting a combination of strong foundational signals alongside meaningful concerns that warrant conditional engagement. Fortinet presents several positive indicators consistent with a mature, enterprise-grade vendor:
Independence Statement
All evidence in this report was independently sourced from external public registries, threat intelligence databases, DNS/TLS analysis, and open-source media — without vendor participation or input.
5 findings identified for Fortinet
7 Hacker News stories about "Fortinet" related to security. Top story: "Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass" (2 points).
fortinet.com is missing 3 recommended security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options.
fortinet.com received a poor grade (D+) from Mozilla HTTP Observatory. Multiple security headers or configurations are missing. Note: This scan was performed on the marketing site (fortinet.com). The application endpoint (auth.fortinet.com) may have different security headers. Verify the application domain separately.
fortinet.com has an AI-related policy page but does not clearly state whether customer data is used for AI model training.
1 older article(s) mention "Fortinet" with risk keywords. Age significantly reduces relevance: "Fortinet: Breach Of Cloud Environment Impacts ‘Small Number’ Of Customers" (crn.com) https://news.google.com/rss/articles/CBMirgFBVV95cUxQaUFHRVF1NjVtQUpwcmRwLTBmQ0k0X1NlY3RnNEhCTGhOUnRHbGJNUHhpamZ6dTFHRlFkbmd3eFhEYTVuM1lzLUdZNkJwR0huNXhBeDBMRmlqYXh4aE11NVVOekY5b3RIeW1CQ3hFTzE5aF9fb0p5U3lkNFkxNTdWNmdEazV3UEpoVlgtVTR5VHE2d3Vac2hHaHNKVU1nY2g4UG5xb1VrU09SaWlyemc?oc=5
27 positive signals verified
Legal Entity Actively Registered
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →No Adverse Media Signals
Adverse Media Scan (Fallback) →Firmographic Data Available
Company Intelligence →Valid SSL Certificate
Domain Analysis →8 Open Ports Detected
Infrastructure Exposure →Established Domain (25+ years)
Domain Registration →Clean domain reputation
Threat Intelligence →Certificate Data from TLS Handshake
Certificate Transparency →Established Web Presence (24+ years)
Web Archive History →Domain in 14 Threat Intelligence Pulses
Threat Intelligence (OTX) →Clean IP Reputation
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Certification Claimed: ISO 27001
Trust & Compliance Page Scan →Certification Claimed: GDPR
Trust & Compliance Page Scan →Certification Claimed: CCPA
Trust & Compliance Page Scan →Certification Claimed: NIST
Trust & Compliance Page Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Certification Claimed: HIPAA
Trust & Compliance Page Scan →Certification Claimed: CSA STAR
Trust & Compliance Page Scan →Subprocessor Page Found, No Entries Parsed
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →HITRUST Directory Match — Manual Verification Required
Certification Registry Verification →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →AI Data Retention Policy Not Specified
AI Data Usage Policy →Steps to address findings for Fortinet
PRIORITY 1 — Request SOC 2 Type II report and bridge letter: Contact Fortinet's security team via trust.fortinet.com and request their current SOC 2 Type II report along with a bridge letter covering the period since the last audit. Many vendors will provide this under NDA. Document the receipt date and audit period in your vendor risk register.
PRIORITY 2 — Verify ISO 27001 certification status: Request the current ISO/IEC 27001 certificate directly from Fortinet, including the certificate number, issuing certification body, scope, and expiry date. Cross-check the certificate number independently at https://www.iafcertsearch.org to confirm it is active and not expired.
PRIORITY 3 — Assess product vulnerability exposure: Review your organization's deployment of Fortinet products (FortiGate, FortiWeb, FortiSIEM) against Fortinet's PSIRT advisories at https://www.fortinet.com/corporate/about-us/security-and-compliance/psirt.html. Confirm that all deployed Fortinet appliances and software are running current patched versions, specifically addressing the zero-days and KEV-listed vulnerabilities identified in community discussion (2FA bypass in FortiGate, multiple FortiWeb RCE vulnerabilities). Establish a process to review Fortinet PSIRT advisories on a weekly cadence.
PRIORITY 4 — Obtain AI data usage commitment in writing: Contact Fortinet's data privacy team and request a written statement clarifying whether customer data processed by Fortinet AI features is used for model training, which third-party AI providers are involved, and what the applicable retention periods are. Reference https://fortinet.com/trust in your inquiry. If training on customer data cannot be ruled out, evaluate whether this conflicts with your data processing agreements or regulatory obligations.
PRIORITY 5 — Manually review subprocessor list: Navigate to https://fortinet.com/docs/subprocessors and manually document all listed subprocessors, their processing roles, and their countries of operation. If the page is access-restricted or non-parseable, request a current subprocessor list from your Fortinet account representative. Screen identified subprocessors against your organization's OFAC and sanctions screening requirements.
PRIORITY 6 — Verify CSA STAR and HITRUST status: Confirm CSA STAR certification or self-assessment directly at https://cloudsecurityalliance.org/star/registry (search 'Fortinet'). Verify the HITRUST directory entry at https://directory.hitrustalliance.net/search?q=Fortinet to determine whether the 90%-confidence match represents a confirmed Fortinet certification. Document findings in your compliance file.
PRIORITY 7 — Review marketing site security headers: Note that fortinet.com's marketing website received a D+ HTTP security grade (40/100) with missing Strict-Transport-Security, Content-Security-Policy, and X-Frame-Options headers. While this applies to the public marketing site rather than the authenticated application endpoint (auth.fortinet.com), raise this with your Fortinet account team and request a security header assessment for the application domain your organization uses. Verify independently at https://observatory.mozilla.org/analyze/auth.fortinet.com.
24 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Fortinet? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Fortinet on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Fortinet's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Fortinet a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Fortinet appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Fortinet's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Fortinet's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Fortinet claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Fortinet depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Fortinet appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Fortinet and every other vendor in your stack — average report time: 7 minutes. Get Fortinet's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Fortinet across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.