13
© Copyright Fortinet Inc. All rights reserved. Cyber Threat Assessment

CYBER THREAT ASSESSMENT

Embed Size (px)

Citation preview

Page 1: CYBER THREAT ASSESSMENT

© Copyright Fortinet Inc. All rights reserved.

Cyber Threat Assessment

Page 2: CYBER THREAT ASSESSMENT

2

Page 3: CYBER THREAT ASSESSMENT

3

it’s

FASTand

FREE

ASSESS YOUR NETWORK PERFORMANCE AND SECURITY

Page 4: CYBER THREAT ASSESSMENT

4

3 AREAS OF ANALYSIS

SECURITY

& THREAT PREVENTION

USER

PRODUCTIVITY

NETWORK

UTILIZATION

Page 5: CYBER THREAT ASSESSMENT

5

REPORTED DATA

» Network security solution effectiveness

» Application vulnerabilities

» Malware/botnets detection

» “At risk” devices within the network

» Applications and web resources usage within the network

» Peer to peer, social media, instant messaging share of the network usage

» Usage of client-server and web-based applications in alignment with corporate

policies

» Network performance improvement area

» Throughput, session and bandwidth requirements during peak hours

» Security solution sizing and optimization for your actual usage

Page 6: CYBER THREAT ASSESSMENT

6

HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS

Register for a

free assessment

on ctap.fortinet.com1

Our experts will employ

a FortiGate to monitor

your network2

The FortiGate will

collect network logs for

a predetermined time3

We review Cyber

Threat Assessment

findings with you4

Page 7: CYBER THREAT ASSESSMENT

7

2 DEPLOYMENT MODES

TRANSPARENT MODE

USING PORT PAIRS

ONE-ARM SNIFFER

USING PORT MIRRORING

Page 8: CYBER THREAT ASSESSMENT

8

LOGS COLLECTION

Local

» Gather logs from FortiGate,

compress (zip|tar) & upload

(100MB file size limitation)

Send Logs to FortiAnalyzer

hosted in the cloud

Page 9: CYBER THREAT ASSESSMENT

9

CTAP REPORT AT A GLANCE

Page 10: CYBER THREAT ASSESSMENT

10

CTAP REPORT AT A GLANCE

Deployment details

and methodologyExecutive summary Recommended

actions

Security and

Threat Prevention

Security and

Threat Prevention – Part 2

User productivity Web usage Network Utilization FortiGuard services

Page 11: CYBER THREAT ASSESSMENT

11

CYBER THREAT ASSESSMENT REPORT EXCERPTS

Page 12: CYBER THREAT ASSESSMENT

12

IMPROVEMENT AREA ANALYSIS

After a week of log collection

Findings introduction thanks to the report

Enhancements proposal done by your trusted advisor

Page 13: CYBER THREAT ASSESSMENT