© Copyright Fortinet Inc. All rights reserved.
Cyber Threat Assessment Program
15 Aprile 2016
2
3
it’s
FAST
and
FREE
ASSESS YOUR NETWORK
PERFORMANCE AND SECURITY
4
3 AREAS OF ANALYSIS
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
5
REPORTED DATA
» Network security solution effectiveness
» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network
» Applications and web resources usage within the network
» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate
policies
» Network performance improvement area
» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage
6
HOW THE CYBER THREAT
ASSESSMENT PROGRAM WORKS
Register for a
free assessment
on ctap.fortinet.com
1
Our experts will employ
a FortiGate to monitor
your network
2
The FortiGate will
collect network logs for
a predetermined time
3
We review Cyber
Threat Assessment
findings with you
4
7
AVAILABLE FORTIGATE PLATFORMS
 FortiGate 100D
(entry-level)
 FortiGate 300D
(mid-range)
 FortiGate 1500D
(mid-range+)
8
2 DEPLOYMENT MODES
TRANSPARENT MODE
USING PORT PAIRS
ONE-ARM SNIFFER
USING PORT MIRRORING
9
LOGS COLLECTION
 Local
» Gather logs from FortiGate,
compress (zip|tar) & upload
(100MB file size limitation)
 Send Logs to FortiAnalyzer
hosted in the cloud
10
CTAP REPORT AT A GLANCE
11
CTAP REPORT AT A GLANCE
Deployment details
and methodology
Executive summary Recommended
actions
Security and
Threat Prevention
Security and
Threat Prevention – Part 2
User productivity Web usage Network Utilization FortiGuard services
12
CYBER THREAT ASSESSMENT
REPORT EXCERPTS
13
IMPROVEMENT AREA ANALYSIS
 After a week of log collection
 Findings introduction thanks to the report
 Enhancements proposal done by your trusted advisor
CTAP

More Related Content

PDF
Introduction to IoT
PPT
Software Company Profile -Corporate services
PDF
Milesight IoT Company & Products Presentation R.pdf
PPTX
Internet of things - challenges scopes and solutions
PDF
EDGE COMPUTING
PDF
Using RFID in Manufacturing Operations
PPTX
Energy Efficiency in Internet of Things
PPTX
Investigation of a cyber crime
Introduction to IoT
Software Company Profile -Corporate services
Milesight IoT Company & Products Presentation R.pdf
Internet of things - challenges scopes and solutions
EDGE COMPUTING
Using RFID in Manufacturing Operations
Energy Efficiency in Internet of Things
Investigation of a cyber crime

What's hot (20)

PDF
edge computing seminar report.pdf
PDF
Web of Things Application Architecture
PPTX
Edge Computing.pptx
PPTX
Internet of Things
PPTX
IoT(internet of Things) Basics
PDF
IoT and 5G: Opportunities and Challenges, SenZations 2015
PDF
Domain Specific IoT
PPTX
How to build an integrated and actionable IT Service Catalog
PDF
Design Principles for Connected Devices
PPTX
Internet of thing(iot)
DOCX
Security and Privacy considerations in Internet of Things
PPTX
Internet of Things
PPTX
Edge computing
PPTX
IoT based weather monitoring system.pptx
PPTX
Achieving GxP compliance with SAP S/4HANA in the AWS Cloud
PDF
Security in IoT
PDF
Cyber Forensics
PPTX
IoT security
PPTX
Iot audit
PPTX
01 IoT Development History and Overview.pptx
edge computing seminar report.pdf
Web of Things Application Architecture
Edge Computing.pptx
Internet of Things
IoT(internet of Things) Basics
IoT and 5G: Opportunities and Challenges, SenZations 2015
Domain Specific IoT
How to build an integrated and actionable IT Service Catalog
Design Principles for Connected Devices
Internet of thing(iot)
Security and Privacy considerations in Internet of Things
Internet of Things
Edge computing
IoT based weather monitoring system.pptx
Achieving GxP compliance with SAP S/4HANA in the AWS Cloud
Security in IoT
Cyber Forensics
IoT security
Iot audit
01 IoT Development History and Overview.pptx
Ad

Viewers also liked (8)

PPSX
Linux02 install SSh
PDF
Fortinet & VMware integration
PPTX
Fortinet sandboxing
PPT
Fortigate Training
PDF
FortiGate Firewall HOW-TO - DMZ
Linux02 install SSh
Fortinet & VMware integration
Fortinet sandboxing
Fortigate Training
FortiGate Firewall HOW-TO - DMZ
Ad

Similar to CTAP (20)

PPTX
160415 lan and-wan-ctap
PPTX
CYBER THREAT ASSESSMENT
PDF
Flyer-CTA-cobrand-Breaker
PDF
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
PPTX
FortiAnalyzer Sales Decffeff4r2r324weweq
PDF
Integrated Secure Networking - Fortinet
PPTX
Simplify SOC Automation with FortiAnalyzer
PPTX
Fortinet k
PPSX
Fortinet_for_SAP
PDF
Fortinet security ecosystem
PPTX
Fortinet Corporate Overview Deck.pptx
PPSX
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
PPTX
What is a cybersecurity assessment 20210813
PPTX
Network Security - Fortinet, Dublin June 2017
PPTX
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
PPTX
Fortinet Corporate Overview Deck 11.pptx
PPTX
Fortinet Tanıtım
PDF
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
PPTX
FortiMail
160415 lan and-wan-ctap
CYBER THREAT ASSESSMENT
Flyer-CTA-cobrand-Breaker
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
FortiAnalyzer Sales Decffeff4r2r324weweq
Integrated Secure Networking - Fortinet
Simplify SOC Automation with FortiAnalyzer
Fortinet k
Fortinet_for_SAP
Fortinet security ecosystem
Fortinet Corporate Overview Deck.pptx
Fortinet Mikulov 2020 -Jen chránit síť nestačí.ppsx
What is a cybersecurity assessment 20210813
Network Security - Fortinet, Dublin June 2017
Het ecosysteem als complete bescherming tegen cybercriminaliteit [pvh]
Partner Zymbian & Fortinet webinar on Web2.0 security
Fortinet Corporate Overview Deck 11.pptx
Fortinet Tanıtım
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
FortiMail

More from Lan & Wan Solutions (20)

PDF
Nuova presentazione Lan & Wan Solutions Fortinet Partner
PDF
Nuova presentazione Lan & Wan Solutions
PDF
Mc business solutions set
PDF
Mc partner playbook
PPTX
160415 lan and-wan-secure-access-architecture
PPTX
PPTX
PPTX
Evento 15 aprile
PPTX
Secure Access Architecture
PPTX
Advanced Threat Protection
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
Scheda tecnica hspa 08
PPS
Antenne filari
PPS
Antenne multifilari
PPTX
PPTX
Emea nutanix overview presentation emea
PPTX
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions
Mc business solutions set
Mc partner playbook
160415 lan and-wan-secure-access-architecture
Evento 15 aprile
Secure Access Architecture
Advanced Threat Protection
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Scheda tecnica hspa 08
Antenne filari
Antenne multifilari
Emea nutanix overview presentation emea

Recently uploaded (20)

PDF
Secondary Research in Case Competitions.pdf
PPTX
Java_Basics_Grade6 powerpoint prese.pptx
PPTX
UAV WHAT MINERAL ARE REQUIRED FOR MAKING OF UAV
PDF
Unit-IV Biochemical Techniqugvgvenjs.pdf
PPTX
IC Integrated circuits ppt for undergraduate course.pptx
PDF
Delhi girls call now pls cute girls in delhi call now ♥️ girls in delhi with ...
DOCX
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
PPT
Access List. Configuration of Layer three Router Access List
PPTX
Malnutrition_Presentation_Revised.pptxhwjsjjsjs
PPTX
vinay_mahavar_industrial_training_3D.pptx
PPTX
美国乔治华盛顿大学硕士毕业证{GWU毕业完成信GWU成绩单}如何办理学历认证
PPTX
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
PPTX
Installation and Maintenance in Hardware
PPTX
How Internet Videos Changed Education
DOC
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭
PDF
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
PPTX
vinay_mahavar_enhanddsfsdfssdfssfced.pptx
PPTX
伦敦国王学院学历认证范本KCL成绩单激光标伦敦国王学院学费单成绩单
PPT
Light utility vehicles 522024.ppt
PPTX
Presentation utk shar baurlah bhhkuaie.pptx
Secondary Research in Case Competitions.pdf
Java_Basics_Grade6 powerpoint prese.pptx
UAV WHAT MINERAL ARE REQUIRED FOR MAKING OF UAV
Unit-IV Biochemical Techniqugvgvenjs.pdf
IC Integrated circuits ppt for undergraduate course.pptx
Delhi girls call now pls cute girls in delhi call now ♥️ girls in delhi with ...
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
Access List. Configuration of Layer three Router Access List
Malnutrition_Presentation_Revised.pptxhwjsjjsjs
vinay_mahavar_industrial_training_3D.pptx
美国乔治华盛顿大学硕士毕业证{GWU毕业完成信GWU成绩单}如何办理学历认证
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
Installation and Maintenance in Hardware
How Internet Videos Changed Education
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭
Delhi c@lL girl$ in delhi cute girls with travel with family call now with cu...
vinay_mahavar_enhanddsfsdfssdfssfced.pptx
伦敦国王学院学历认证范本KCL成绩单激光标伦敦国王学院学费单成绩单
Light utility vehicles 522024.ppt
Presentation utk shar baurlah bhhkuaie.pptx

CTAP

  • 1. © Copyright Fortinet Inc. All rights reserved. Cyber Threat Assessment Program 15 Aprile 2016
  • 2. 2
  • 4. 4 3 AREAS OF ANALYSIS SECURITY & THREAT PREVENTION USER PRODUCTIVITY NETWORK UTILIZATION
  • 5. 5 REPORTED DATA » Network security solution effectiveness » Application vulnerabilities » Malware/botnets detection » “At risk” devices within the network » Applications and web resources usage within the network » Peer to peer, social media, instant messaging share of the network usage » Usage of client-server and web-based applications in alignment with corporate policies » Network performance improvement area » Throughput, session and bandwidth requirements during peak hours » Security solution sizing and optimization for your actual usage
  • 6. 6 HOW THE CYBER THREAT ASSESSMENT PROGRAM WORKS Register for a free assessment on ctap.fortinet.com 1 Our experts will employ a FortiGate to monitor your network 2 The FortiGate will collect network logs for a predetermined time 3 We review Cyber Threat Assessment findings with you 4
  • 7. 7 AVAILABLE FORTIGATE PLATFORMS  FortiGate 100D (entry-level)  FortiGate 300D (mid-range)  FortiGate 1500D (mid-range+)
  • 8. 8 2 DEPLOYMENT MODES TRANSPARENT MODE USING PORT PAIRS ONE-ARM SNIFFER USING PORT MIRRORING
  • 9. 9 LOGS COLLECTION  Local » Gather logs from FortiGate, compress (zip|tar) & upload (100MB file size limitation)  Send Logs to FortiAnalyzer hosted in the cloud
  • 10. 10 CTAP REPORT AT A GLANCE
  • 11. 11 CTAP REPORT AT A GLANCE Deployment details and methodology Executive summary Recommended actions Security and Threat Prevention Security and Threat Prevention – Part 2 User productivity Web usage Network Utilization FortiGuard services
  • 13. 13 IMPROVEMENT AREA ANALYSIS  After a week of log collection  Findings introduction thanks to the report  Enhancements proposal done by your trusted advisor

Editor's Notes

  • #4: It’s fast: 1 week of logs collection