© Copyright Fortinet Inc. All rights reserved.
Cyber Threat Assessment
2
3
it’s
FASTand
FREE
ASSESS YOUR NETWORK PERFORMANCE AND SECURITY
4
3 AREAS OF ANALYSIS
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
5
REPORTED DATA
» Network security solution effectiveness
» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network
» Applications and web resources usage within the network
» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate
policies
» Network performance improvement area
» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage
6
HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS
Register for a
free assessment
on ctap.fortinet.com1
Our experts will employ
a FortiGate to monitor
your network2
The FortiGate will
collect network logs for
a predetermined time3
We review Cyber
Threat Assessment
findings with you4
7
2 DEPLOYMENT MODES
TRANSPARENT MODE
USING PORT PAIRS
ONE-ARM SNIFFER
USING PORT MIRRORING
8
LOGS COLLECTION
Local
» Gather logs from FortiGate,
compress (zip|tar) & upload
(100MB file size limitation)
Send Logs to FortiAnalyzer
hosted in the cloud
9
CTAP REPORT AT A GLANCE
10
CTAP REPORT AT A GLANCE
Deployment details
and methodologyExecutive summary Recommended
actions
Security and
Threat Prevention
Security and
Threat Prevention – Part 2
User productivity Web usage Network Utilization FortiGuard services
11
CYBER THREAT ASSESSMENT REPORT EXCERPTS
12
IMPROVEMENT AREA ANALYSIS
After a week of log collection
Findings introduction thanks to the report
Enhancements proposal done by your trusted advisor