Top Banner
© Copyright Fortinet Inc. All rights reserved. Cyber Threat Assessment
13

CYBER THREAT ASSESSMENT

Jan 23, 2018

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CYBER THREAT ASSESSMENT

© Copyright Fortinet Inc. All rights reserved.

Cyber Threat Assessment

Page 2: CYBER THREAT ASSESSMENT

2

Page 3: CYBER THREAT ASSESSMENT

3

it’s

FASTand

FREE

ASSESS YOUR NETWORK PERFORMANCE AND SECURITY

Page 4: CYBER THREAT ASSESSMENT

4

3 AREAS OF ANALYSIS

SECURITY

& THREAT PREVENTION

USER

PRODUCTIVITY

NETWORK

UTILIZATION

Page 5: CYBER THREAT ASSESSMENT

5

REPORTED DATA

» Network security solution effectiveness

» Application vulnerabilities

» Malware/botnets detection

» “At risk” devices within the network

» Applications and web resources usage within the network

» Peer to peer, social media, instant messaging share of the network usage

» Usage of client-server and web-based applications in alignment with corporate

policies

» Network performance improvement area

» Throughput, session and bandwidth requirements during peak hours

» Security solution sizing and optimization for your actual usage

Page 6: CYBER THREAT ASSESSMENT

6

HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS

Register for a

free assessment

on ctap.fortinet.com1

Our experts will employ

a FortiGate to monitor

your network2

The FortiGate will

collect network logs for

a predetermined time3

We review Cyber

Threat Assessment

findings with you4

Page 7: CYBER THREAT ASSESSMENT

7

2 DEPLOYMENT MODES

TRANSPARENT MODE

USING PORT PAIRS

ONE-ARM SNIFFER

USING PORT MIRRORING

Page 8: CYBER THREAT ASSESSMENT

8

LOGS COLLECTION

Local

» Gather logs from FortiGate,

compress (zip|tar) & upload

(100MB file size limitation)

Send Logs to FortiAnalyzer

hosted in the cloud

Page 9: CYBER THREAT ASSESSMENT

9

CTAP REPORT AT A GLANCE

Page 10: CYBER THREAT ASSESSMENT

10

CTAP REPORT AT A GLANCE

Deployment details

and methodologyExecutive summary Recommended

actions

Security and

Threat Prevention

Security and

Threat Prevention – Part 2

User productivity Web usage Network Utilization FortiGuard services

Page 11: CYBER THREAT ASSESSMENT

11

CYBER THREAT ASSESSMENT REPORT EXCERPTS

Page 12: CYBER THREAT ASSESSMENT

12

IMPROVEMENT AREA ANALYSIS

After a week of log collection

Findings introduction thanks to the report

Enhancements proposal done by your trusted advisor

Page 13: CYBER THREAT ASSESSMENT