CYBER THREAT ASSESSMENT

Post on 23-Jan-2018

220 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

Transcript

© Copyright Fortinet Inc. All rights reserved.

Cyber Threat Assessment

2

3

it’s

FASTand

FREE

ASSESS YOUR NETWORK PERFORMANCE AND SECURITY

4

3 AREAS OF ANALYSIS

SECURITY

& THREAT PREVENTION

USER

PRODUCTIVITY

NETWORK

UTILIZATION

5

REPORTED DATA

» Network security solution effectiveness

» Application vulnerabilities

» Malware/botnets detection

» “At risk” devices within the network

» Applications and web resources usage within the network

» Peer to peer, social media, instant messaging share of the network usage

» Usage of client-server and web-based applications in alignment with corporate

policies

» Network performance improvement area

» Throughput, session and bandwidth requirements during peak hours

» Security solution sizing and optimization for your actual usage

6

HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS

Register for a

free assessment

on ctap.fortinet.com1

Our experts will employ

a FortiGate to monitor

your network2

The FortiGate will

collect network logs for

a predetermined time3

We review Cyber

Threat Assessment

findings with you4

7

2 DEPLOYMENT MODES

TRANSPARENT MODE

USING PORT PAIRS

ONE-ARM SNIFFER

USING PORT MIRRORING

8

LOGS COLLECTION

Local

» Gather logs from FortiGate,

compress (zip|tar) & upload

(100MB file size limitation)

Send Logs to FortiAnalyzer

hosted in the cloud

9

CTAP REPORT AT A GLANCE

10

CTAP REPORT AT A GLANCE

Deployment details

and methodologyExecutive summary Recommended

actions

Security and

Threat Prevention

Security and

Threat Prevention – Part 2

User productivity Web usage Network Utilization FortiGuard services

11

CYBER THREAT ASSESSMENT REPORT EXCERPTS

12

IMPROVEMENT AREA ANALYSIS

After a week of log collection

Findings introduction thanks to the report

Enhancements proposal done by your trusted advisor

top related