Leveraging Fortinet Solutions For Your MSSP Advantage - PDF
Leveraging Fortinet Solutions For Your MSSP Advantage - PDF
Multiple code modules (OSS, Endless stream of zero-day Organizations have limited Too many informational,
Custom code, IaC, attacks and application logic knowledge of their public contextless and false
Container), tool proliferation, attacks that do not have APIs even though API positive alerts
identifying risk and priority, signature protection traffic dominates
CI/CD integration
Web Protection
Machine Learning Powered OWASP Top 10 • Known Threats •
Zero day • Unknown Threats •
Web Application & API Security Sophisticated Attacks
THREAT
DETECTION Known Issues/Limitations
• Blocking all anomalies leads
to high false positives
Application
All Anomalies
• Accuracy requires labor
Traffic intensive fine tuning
• Unobserved variations
trigger anomalies
BLOCKED
• Whitelisting characters used
✘ ✘ ✘ Blocked Request Traffic in attacks leads to threats
(with false positives) evading detection
Whitelist matching • Changes to application
= Normal Request using observed request
traffic during “learning require relearning
= Benign Anomaly windows”
= Threat
ANOMALY THREAT
DETECTION DETECTION
Application
Anomalies Threats
Traffic
BLOCKED
✘ ✘ ✘
Statistical probability Pattern analysis
= Normal Request analysis based on matching based on
observed application FortiGuard trained and
= Benign Anomaly traffic over time curated threat models
= Threat
45% aren’t
confident they
can deal with
bots
WAF
© Fortinet Inc. All Rights Reserved. 8
Advanced Bot Protection
API-Dependent Interconnected Services Create Blind Spots
42% of people
are not
confident they
know all of the
APIs in their org
Validate and
enforce
schemas and Anomaly Detection,
API endpoint limit HTTP methods
access
Preventing
data
exposure & Object Access Control, token security
MITM
Account
Takeover Advanced Bot Protection
and other bot
attacks
Mitigate
Denial of JSON/XML bombs
Service
SOC
Speeds up WAF alerts Helps analysts Insights provide Ingests events from
security investigation focus on the most suggestions to harden across your entire hybrid
important threats - security based on findings cloud environments
alleviates alert fatigue
FortiGuard Services
• Threat actors constantly • Ever-growing IoT • Cybersecurity skills shortage • Market valuation
looking for ways into digital footprint • Firehose of information • Revenue and customer
your network • Dynamic cloud assets trust / loyalty
• New attack vectors
• Initial access sold to • Mergers & Acquisitions • Identity fraud prevention
ransomware gangs • New TTPs
• Business credibility
Urgent need to gain visibility of the entire attack surface and prioritize remediation
+
Brand Protection
Detect brand and identity impersonations, Brand Protection
website typosquatting, rogue applications
+
Adversary Centric Intelligence
Curated, actionable FortiGuard Labs Dark Web Monitoring
threat intelligence
Asset Discovery
Internal External
Asset Discovery
Recommendations
Avoid Blind Spots in Security Comprehensive discovery of
i
assets, such as Domains / External Recommended
Monitoring IP / ASN / subdomains /
Attack Surface
actions
certificates
ç of the network Management
• Adversary view
• Identify critical issues
• Prioritize remediation
before exploitation
Change / Delta
Comparison
Comparison with previous
scanning results to identify
recent changes
© Fortinet Inc. All Rights Reserved. 18
Brand Protection (BP)
Protection (BP)
detects web-based phishing
attacks, typosquatting, rogue
apps, credential leaks and brand
impersonation in social media,
Social Code Repo &
common techniques used by Media Phishing Storage Buckets
cyber threat actors. Monitor for malicious social Track phishing campaigns Identify cloud application
media accounts against brands misconfigurations & data leaks
Ransomware
Forums / Markets Technical IOCs
Activity
Executive Strategic
FortiRecon Adversary Management Decision Makers
Prioritize Analyze
Centric Intelligence (ACI)
provides contextual insights into
imminent threats to organizations Tactical GRC
and allow them to respond faster to Teams Teams
Validate Contextualize
incidents, better understand their
attackers and safeguard their assets.
4 Deliver
Delivered to customer through Flash Reports & Threat Reports via Customer Portal & Email
Identify and control Response Enhanced visibility On-demand web app Asset and risk
exposed assets orchestration and fast analysis vulnerability scan discovery
(e.g., NAT) (e.g., PW reset) AWS
Azure
Google Cloud Platform
Rest API
BEC
36%↑ 15X ↑ 58%
10%↑
Percent of breaches Increased use of Percent of Business Email Percent of breaches
involving phishing, up from “Misrepresentation” in Social Compromise (BEC) attacks involving ransomware, up
25% YoY. Engineering-related that resulted in loss of from ~5% the prior year.*
incidents. money.
Comprehensive Protection
Cloud-based
Email
Validated Performance
Hybrid Email
Industry-Leading Cost to Performance
Illicit/Adult Content
Malicious URLs
Spam
API
Appliance VM FortiMail Cloud
Gateway Transparent Server O365 API
Advanced multi-layer
security against:
• Known threats
• Suspected threats
Impersonation Analysis
• Unknown threats/Zero-days Cousin Domain Detection
Advanced multi-layer
security against:
• Accidental disclosures
• Exfiltration
SIEM
• Man-in-the-Middle Attacks SOAR
Sandbox
Authentication
Privacy & Encryption
Anti-Virus
Content Disarm
Content Analysis
▪ Multi-Vendor
▪ Understanding the IT Assets
▪ On and Off Prem environments
▪ Investigate new threats
▪ SaaS/IaaS
▪ Impacted Assets
▪ Remote Worker
Real-Time Correlation
Threat Intel
Anomaly Detection Analytics Experience
UEBA, AI/ML Investigation
Platform Context
Scalable Architecture Native CMDB
Software, Hardware, SaaS Operational & Security
Platform Multi-Tenancy Monitoring
Millions of EPS. Risk
FortiSIEM Cloud
FortiSIEM SaaS platform
Cloud (BYOL)
Full cloud deployment of FortiSIEM monitors
organizational assets from the cloud
Hybrid Cloud
FortiSIEM is deployed both on prem and in cloud to monitor onsite
and cloud assets
On Prem
FortiSIEM is deployed on prem to monitor onsite and cloud assets
© Fortinet Inc. All Rights Reserved. 36
FortiSIEM Cloud Portal
Cloud Portal
Customizable
upgrade schedule
On Premise
Supports hardware
Virtual Collector
and virtual Collectors
API Hardware
Collector
Deploy Collectors on
premise or in the Cloud
Virtual Collector API Virtual Collector
Collect logs from Cloud
Infrastructure Platforms
API
(AWS, Azure, GCP, OCI) FortiSIEM Cloud Roaming Users
with and without
Virtual Collector
Collectors*
API
FortiSIEM Agent – UEBA and Logs
• Scale Out Architecture • Reduce Complexity • Unify NOC & SOC functions
• Scale Licensing • Multi-Tenancy/MSSP • Comprehensive CMDB
• Virtual, HW and Cloud • Multi-Vendor Support • Performance and Security Monitoring
▪ Size
for average EPS ▪ High Speed Storage ▪ Long term retention, ▪ Attach
your own AWS
and event size months or years S3 Storage
▪ Typically
for nearer
▪ Search Archive the ▪ FortiSIEMwill move
▪ Performance resources term queries. 30/60/90
same as Online without data from Archive to
are allocated by days. the need to restore your S3 Storage
Fortinet to ensure EPS data for querying
▪ Reduce cost for long
performance
▪ No extra charge for term storage
▪ Consistent experience queries
▪ Query data in Cold
▪ Burstable
within Storage via AWS
compute resources. Athena or 3rd party
solutions
“By 2029, 60% of enterprises that do not deploy a unified CNAPP solution within their cloud architecture will lack
extensive visibility into the cloud attack surface and consequently fail to achieve their desired zero-trust goals.”
ENDPOINTS, APIs,
Infrastructure PHYSCIAL SERVERS MICROSERVICES
CONFINED TO DECENTRALIZED
Access LOGICAL NETWORK FROM ANYWHERE
IaC
Cloud Cloud
Services Kubernetes
Services
Virtual Cloud
Machines Services IaC
Virtual
Machines
Virtual
Machines
On-Prem
Services
Cloud
is Complex
• Hundreds of sensitive
actions available
• Services available to
non-expert developers
CDR CIEM
CNAPP:
"Cloud-native application Attack
protection platforms Surface
Mgmt
Serverless
capabilities designed to
CNAPP
secure and protect cloud-
native applications across SCA
SAST Vulnerability
development and production." DAST
IaC
CWPP
Scanning
KSPM
• Scan code and APIs in • Assess cloud infrastructure • Continuously monitor for
development configuration exposures and sensitive data
• Address vulnerabilities, • Evaluate identities and their • Detect unusual behavior and
malware and misconfigurations permissions active threats
• Prevent deployment of • Prioritize risks with attack • Understand running processes
non-compliant applications path analysis and map network connections
Ingest Resolve
Exploitable Risks Composite Risks
Comprehend
Attack Paths Risk Mitigation
Minimize and mitigate
Excessive
Users Misconfigs Entitlements Permissions risk with the least
amount of effort
Active
Vulnerability Secrets …
Vulnerability
100:1 2 to 5 80%
Reduction in the Fewer cloud security Faster investigation of
number of daily alerts tools via consolidation incidents and alerts
Prioritize and quickly Quickly find, investigate Operationalize better Achieve & Maintain
resolve risks and resolve threats security outcomes continuous compliance
Cloud Workload Protection Continuous vulnerability assessment and threat detection Customers must quickly identify
for cloud workloads across hybrid and multi-cloud vulnerabilities and exploit attempts
Platform (CWPP) environments. on running workloads.
Infrastructure as Code (IaC) Automatically detects security and compliance misconfigurations Helps prevent cloud misconfigurations
for cloud infrastructure as code and can also automate the
Security / Policy as Code (PaC) remediation of non-compliant code.
from being deployed into production.
Static / Dynamic Application SAST analyzes source code in development to identify security Identifying security weaknesses before
weaknesses. DAST analyzes built and running apps to assess deployment prevents exploits and is the
Security Testing (SAST / DAST) how they react to various types of exploits. least costly method for improving security.
Software Composition Analysis (SCA) SCA addresses known vulnerabilities in third-party and open- Identifying known vulnerabilities at each
source code libraries. VA assesses libraries within container stage of the lifecycle is a fundamental
/ Vulnerability Assessment (VA) registries and VMs for known vulnerabilities. tenant of any security program.
Cloud Detection and Identifies and responds to anomalies and threats in cloud Identifying and mitigating threats in real-time,
environments with automated security measures and ensures security and compliance, and
Response (CDR) continuous monitoring. minimizes the impact to cloud environments.
Provides visibility of cloud identities and their permissions, Reduce risk of unauthorized access, limit
Cloud Infrastructure Entitlement identifies risky and dormant accounts, and automates identity the blast radius of compromised credentials,
Management (CIEM) policy changes for least privilege access. and comply with least privileged access.
© Fortinet Inc. All Rights Reserved. 53
Thank you!