Fortinet Subprocessors
Security
Fortinet provides cybersecurity solutions to protect networks, users, and data from cyber threats.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Amazon Web Services | Cloud Infrastructure | Cloud Hosting and Infrastructure | United States, Germany, Australia | Customer Data |
| Cloudflare | Cloud Infrastructure | Cloud Infrastructure and Security | Global | Customer Data |
| Docusign | Documents | Electronic Signatures and Order Processing | Customer Data | |
| Cloud Infrastructure | Cloud Hosting and Infrastructure | Global | Customer Data | |
| Marketo | Marketing | Customer Engagement | Customer Data | |
| Medallia | Customer Success | Customer Success | Customer Data | |
| Netsuite | ERP | Billing and Payment | Customer Data | |
| New Relic | Monitoring | Cloud Hosting and Infrastructure | Customer Data | |
| OneTrust | Privacy | Privacy Operations | Customer Data | |
| Okta | Authentication | Customer Authentication | Customer Data | |
| Salesforce | CRM | Customer Relationship Management | Customer Data | |
| Snowflake | Data Warehouse | Cloud Hosting and Infrastructure | United States, Germany, Australia | Customer Data |
| Thoughtspot | Analytics | Data Analytics | Customer Data | |
| Zendesk | Customer Support | Customer Support | Customer Data | |
| Zoom Video Communications | Video | Customer Communication | Customer Data | |
| Gong | Sales | Sales support | Customer Data | |
| Microsoft Azure | Cloud Infrastructure | Cloud infrastructure | Global | Customer Data |
| Microsoft | Cloud Infrastructure | Cloud Hosting and Infrastructure | Customer Data |
Your data may flow beyond direct subprocessors. Click to expand and see the chain.
Loading data flow...
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
18
Total Subprocessors
3
Countries
14
Categories
83%
in United States
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies