cyber threat assessment
TRANSCRIPT
![Page 1: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/1.jpg)
© Copyright Fortinet Inc. All rights reserved.
Cyber Threat Assessment
![Page 2: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/2.jpg)
2
![Page 3: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/3.jpg)
3
it’s
FASTand
FREE
ASSESS YOUR NETWORK PERFORMANCE AND SECURITY
![Page 4: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/4.jpg)
4
3 AREAS OF ANALYSIS
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
![Page 5: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/5.jpg)
5
REPORTED DATA
» Network security solution effectiveness
» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network
» Applications and web resources usage within the network
» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate
policies
» Network performance improvement area
» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage
![Page 6: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/6.jpg)
6
HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS
Register for a
free assessment
on ctap.fortinet.com1
Our experts will employ
a FortiGate to monitor
your network2
The FortiGate will
collect network logs for
a predetermined time3
We review Cyber
Threat Assessment
findings with you4
![Page 7: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/7.jpg)
7
2 DEPLOYMENT MODES
TRANSPARENT MODE
USING PORT PAIRS
ONE-ARM SNIFFER
USING PORT MIRRORING
![Page 8: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/8.jpg)
8
LOGS COLLECTION
Local
» Gather logs from FortiGate,
compress (zip|tar) & upload
(100MB file size limitation)
Send Logs to FortiAnalyzer
hosted in the cloud
![Page 9: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/9.jpg)
9
CTAP REPORT AT A GLANCE
![Page 10: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/10.jpg)
10
CTAP REPORT AT A GLANCE
Deployment details
and methodologyExecutive summary Recommended
actions
Security and
Threat Prevention
Security and
Threat Prevention – Part 2
User productivity Web usage Network Utilization FortiGuard services
![Page 11: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/11.jpg)
11
CYBER THREAT ASSESSMENT REPORT EXCERPTS
![Page 12: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/12.jpg)
12
IMPROVEMENT AREA ANALYSIS
After a week of log collection
Findings introduction thanks to the report
Enhancements proposal done by your trusted advisor
![Page 13: CYBER THREAT ASSESSMENT](https://reader031.vdocuments.site/reader031/viewer/2022021507/5a6760d17f8b9a0a2e8b47e5/html5/thumbnails/13.jpg)