© Copyright Fortinet Inc. All rights reserved.
Cyber Threat Assessment Program
Alessandro Berta – Systems Engineer
15 Aprile 2016
2
3
it’s
FAST
and
FREE
ASSESS YOUR NETWORK
PERFORMANCE AND SECURITY
4
3 AREAS OF ANALYSIS
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
5
REPORTED DATA
» Network security solution effectiveness
» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network
» Applications and web resources usage within the network
» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate
policies
» Network performance improvement area
» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage
6
HOW THE CYBER THREAT
ASSESSMENT PROGRAM WORKS
Register for a
free assessment
on ctap.fortinet.com
1
Our experts will employ
a FortiGate to monitor
your network
2
The FortiGate will
collect network logs for
a predetermined time
3
We review Cyber
Threat Assessment
findings with you
4
7
AVAILABLE FORTIGATE PLATFORMS
 FortiGate 100D
(entry-level)
 FortiGate 300D
(mid-range)
 FortiGate 1500D
(mid-range+)
8
2 DEPLOYMENT MODES
TRANSPARENT MODE
USING PORT PAIRS
ONE-ARM SNIFFER
USING PORT MIRRORING
9
LOGS COLLECTION
 Local
» Gather logs from FortiGate,
compress (zip|tar) & upload
(100MB file size limitation)
 Send Logs to FortiAnalyzer
hosted in the cloud
10
CTAP REPORT AT A GLANCE
11
CTAP REPORT AT A GLANCE
Deployment details
and methodology
Executive summary Recommended
actions
Security and
Threat Prevention
Security and
Threat Prevention – Part 2
User productivity Web usage Network Utilization FortiGuard services
12
CYBER THREAT ASSESSMENT
REPORT EXCERPTS
13
IMPROVEMENT AREA ANALYSIS
 After a week of log collection
 Findings introduction thanks to the report
 Enhancements proposal done by your trusted advisor
160415 lan and-wan-ctap

160415 lan and-wan-ctap

  • 1.
    © Copyright FortinetInc. All rights reserved. Cyber Threat Assessment Program Alessandro Berta – Systems Engineer 15 Aprile 2016
  • 2.
  • 3.
  • 4.
    4 3 AREAS OFANALYSIS SECURITY & THREAT PREVENTION USER PRODUCTIVITY NETWORK UTILIZATION
  • 5.
    5 REPORTED DATA » Networksecurity solution effectiveness » Application vulnerabilities » Malware/botnets detection » “At risk” devices within the network » Applications and web resources usage within the network » Peer to peer, social media, instant messaging share of the network usage » Usage of client-server and web-based applications in alignment with corporate policies » Network performance improvement area » Throughput, session and bandwidth requirements during peak hours » Security solution sizing and optimization for your actual usage
  • 6.
    6 HOW THE CYBERTHREAT ASSESSMENT PROGRAM WORKS Register for a free assessment on ctap.fortinet.com 1 Our experts will employ a FortiGate to monitor your network 2 The FortiGate will collect network logs for a predetermined time 3 We review Cyber Threat Assessment findings with you 4
  • 7.
    7 AVAILABLE FORTIGATE PLATFORMS FortiGate 100D (entry-level)  FortiGate 300D (mid-range)  FortiGate 1500D (mid-range+)
  • 8.
    8 2 DEPLOYMENT MODES TRANSPARENTMODE USING PORT PAIRS ONE-ARM SNIFFER USING PORT MIRRORING
  • 9.
    9 LOGS COLLECTION  Local »Gather logs from FortiGate, compress (zip|tar) & upload (100MB file size limitation)  Send Logs to FortiAnalyzer hosted in the cloud
  • 10.
  • 11.
    11 CTAP REPORT ATA GLANCE Deployment details and methodology Executive summary Recommended actions Security and Threat Prevention Security and Threat Prevention – Part 2 User productivity Web usage Network Utilization FortiGuard services
  • 12.
  • 13.
    13 IMPROVEMENT AREA ANALYSIS After a week of log collection  Findings introduction thanks to the report  Enhancements proposal done by your trusted advisor

Editor's Notes

  • #4 It’s fast: 1 week of logs collection