Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

CYBER THREAT ASSESSMENT

374 views

Published on

LAN & WAN SOLUTIONS IN COLLABORAZIONE CON FORTINET PROPONE IL SERVIZIO DI CYBER THREAT ASSESSMENT

Published in: Technology
  • Be the first to comment

  • Be the first to like this

CYBER THREAT ASSESSMENT

  1. 1. © Copyright Fortinet Inc. All rights reserved. Cyber Threat Assessment
  2. 2. 2
  3. 3. 3 it’s FAST and FREE ASSESS YOUR NETWORK PERFORMANCE AND SECURITY
  4. 4. 4 3 AREAS OF ANALYSIS SECURITY & THREAT PREVENTION USER PRODUCTIVITY NETWORK UTILIZATION
  5. 5. 5 REPORTED DATA » Network security solution effectiveness » Application vulnerabilities » Malware/botnets detection » “At risk” devices within the network » Applications and web resources usage within the network » Peer to peer, social media, instant messaging share of the network usage » Usage of client-server and web-based applications in alignment with corporate policies » Network performance improvement area » Throughput, session and bandwidth requirements during peak hours » Security solution sizing and optimization for your actual usage
  6. 6. 6 HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS Register for a free assessment on ctap.fortinet.com 1 Our experts will employ a FortiGate to monitor your network 2 The FortiGate will collect network logs for a predetermined time 3 We review Cyber Threat Assessment findings with you 4
  7. 7. 7 2 DEPLOYMENT MODES TRANSPARENT MODE USING PORT PAIRS ONE-ARM SNIFFER USING PORT MIRRORING
  8. 8. 8 LOGS COLLECTION  Local » Gather logs from FortiGate, compress (zip|tar) & upload (100MB file size limitation)  Send Logs to FortiAnalyzer hosted in the cloud
  9. 9. 9 CTAP REPORT AT A GLANCE
  10. 10. 10 CTAP REPORT AT A GLANCE Deployment details and methodology Executive summary Recommended actions Security and Threat Prevention Security and Threat Prevention – Part 2 User productivity Web usage Network Utilization FortiGuard services
  11. 11. 11 CYBER THREAT ASSESSMENT REPORT EXCERPTS
  12. 12. 12 IMPROVEMENT AREA ANALYSIS  After a week of log collection  Findings introduction thanks to the report  Enhancements proposal done by your trusted advisor

×