
Fortinet FortiProxy
Secure web gateways
Web security software
- Features
- Ease of use
- Ease of management
- Quality of support
- Affordability
- Market presence
Take the quiz to check if Fortinet FortiProxy and its alternatives fit your requirements.
Contact the product provider
Small
Medium
Large
- Manufacturing
- Energy and utilities
- Transportation and logistics
What is Fortinet FortiProxy
Fortinet FortiProxy is a secure web gateway (SWG) and proxy platform that controls and inspects user web traffic to reduce exposure to web-borne threats and enforce acceptable-use policies. It supports explicit proxy and transparent deployment models and is commonly used by security and network teams to protect branch offices, campuses, and remote users. FortiProxy integrates with Fortinet’s security ecosystem for centralized policy, logging, and threat intelligence, and it can be deployed as hardware, virtual appliance, or cloud-based form factors depending on the environment.
Flexible proxy deployment modes
FortiProxy supports explicit proxy and transparent proxy configurations, which helps organizations align deployment with existing network designs. It can be positioned at internet egress points for branches or campuses and used to enforce web access policies consistently. Multiple form factors (appliance and virtual) support different capacity and infrastructure requirements.
Deep web traffic inspection
The product provides URL filtering and content controls and can inspect encrypted traffic using SSL/TLS decryption where policy and regulations allow. This enables detection and blocking of malware delivery, phishing, and risky categories that arrive over web protocols. Security teams can apply granular policies by user/group, destination category, and application context.
Ecosystem integration for operations
FortiProxy integrates with Fortinet management and analytics components to centralize configuration, logging, and reporting. This can reduce operational overhead compared with running separate tools for proxy policy, event analysis, and device management. Integration with identity sources and directory services supports user-based policy enforcement.
Best fit in Fortinet stack
Organizations not standardized on Fortinet may need additional integration work to match the same level of centralized management and telemetry. Some capabilities are most efficient when paired with Fortinet’s broader security and networking components. This can increase complexity for mixed-vendor environments.
SSL inspection operational overhead
Effective threat detection often depends on SSL/TLS inspection, which introduces certificate management, privacy considerations, and exception handling. Misconfiguration can cause application breakage or user experience issues, especially for modern web apps and certificate pinning. Teams typically need clear governance and ongoing tuning to maintain coverage without disruption.
Proxy-centric architecture constraints
As a proxy/SWG product, FortiProxy is strongest for controlling web traffic but may require complementary controls for broader security service edge use cases (e.g., non-web traffic, full ZTNA, or CASB-style controls) depending on requirements. Remote-user scenarios may need additional components or design work to ensure consistent enforcement off-network. This can make end-to-end SSE/SASE consolidation less straightforward if that is the primary goal.
Plan & Pricing
| Plan | Price | Key features & notes |
|---|---|---|
| FortiProxy 400G (hardware) | Not publicly listed — contact Fortinet/authorized reseller | Up to 6,000 users; hardware appliance; see FortiProxy product page for specs. |
| FortiProxy 2000G (hardware) | Not publicly listed — contact Fortinet/authorized reseller | Up to 20,000 users; hardware appliance. |
| FortiProxy 4000G (hardware) | Not publicly listed — contact Fortinet/authorized reseller | Up to 60,000 users; hardware appliance. |
| FortiProxy VM02 (virtual) | Not publicly listed — contact Fortinet/authorized reseller | VM license (100–500 users). Available as BYOL (perpetual) or subscription (s-series) per Fortinet docs. |
| FortiProxy VM04 (virtual) | Not publicly listed — contact Fortinet/authorized reseller | VM license (100–2,500 users). |
| FortiProxy VM08 (virtual) | Not publicly listed — contact Fortinet/authorized reseller | VM license (100–10,000 users). |
| FortiProxy VM16 (virtual) | Not publicly listed — contact Fortinet/authorized reseller | VM license (100–25,000 users). |
| FortiProxy VMUL (virtual) | Not publicly listed — contact Fortinet/authorized reseller | VM license (100–50,000 users). |
| FortiProxy-VM (cloud marketplace) | Not publicly listed on Fortinet product pages — contact Fortinet/authorized reseller or cloud marketplace for PAYG | Deployment options include BYOL (perpetual) and subscription; cloud marketplaces may charge separately for compute/storage. |
Notes:
- Fortinet product pages and documentation list models, license capacities, and licensing/order types but do not publish list prices on the public product pages; Fortinet directs customers to purchase licenses through partners/resellers and references a price list that is maintained separately. (See official Fortinet product and licensing documentation.)
Seller details
Fortinet, Inc.
Sunnyvale, California, USA
2000
Public
https://www.fortinet.com/
https://x.com/Fortinet
https://www.linkedin.com/company/fortinet/