Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

CYBER THREAT ASSESSMENT PROGRAM

© Copyright Fortinet Inc. All rights reserved.


2
ASSESS YOUR NETWORK
PERFORMANCE AND SECURITY

it’s

FAST
and

FREE
3
HOW DOES IT WORK?

1 2 3
REGISTRATION LOG COLLECTION CTAP REPORT
Register online or In-portal FortiGate will be installed in We review the CTAP report
registration through XXX your network to collect logs. with you and discuss
(reseller name) Further your network opportunity to enhance your
profiling, one of the network performance and
following units will be used: security
- FortiGate 100D
- FortiGate 300D
- FortiGate 1500D

4
2 DEPLOYMENT MODES

ONE-ARM SNIFFER TRANSPARENT MODE


USING PORT MIRRORING USING PORT PAIRS

5
3 AREAS OF ANALYSIS

SECURITY USER NETWORK


& THREAT PREVENTION PRODUCTIVITY UTILIZATION

6
REPORTED DATA

» Network security solution effectiveness


» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network

» Applications and web resources usage within the network


» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate policies

» Network performance improvement area


» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage

7
CTAP REPORT AT A GLANCE

Cover Page Deployment Details Executive Summary Industry Comparables Recommended Security and Threats Security and Threats Security and Threats
and Methodology Actions (Applications) (Malware) (Encryption/Sources)

User Productivity User Productivity User Productivity User Productivity Network Utilization Network Utilization Network Utilization FortiGuard Services
(SaaS/IaaS Usage) (Application Usage) (Web Usage) (Websites Frequented) (Bandwidth) (Sizing Information) (Firewall Statistics)

8
CYBER THREAT ASSESSMENT REPORT SAMPLE

AVAILABLE IN

• French
• German
• Spanish
• Japenese
• Korean
• Hebrew

9
IMPROVEMENT AREA ANALYSIS

 After a week of log collection


 Findings introduction thanks to the report
 Enhancements proposal done by your trusted advisor

Reseller logo

10

You might also like