You can’t protect yourself from what you don’t know. Cyber-space is a dangerous environment and the number and types of threats to the data and applications on your network are expanding, even as you read this article. Every day you read about hacks, intrusions and malware wreaking havoc on the unsuspecting. And by the time you realise that you are at risk it might be too late. The first step in any network security risk management initiative should be to identify the threats and quantify the risks.
Easier said than done. But not with Fortinet’s recently launched Cyber Threat Assessment Program (CTAP). If you have any doubts what-so-ever about the effectiveness of your current cyber-security protection and network visibility, you can now get, free-of-charge, a second opinion from Fortinet.
“Fortinet’s Cyber Threat Assessment Program (CTAP) will provide you with in-depth information about the current state of your network,” says Andrew Khan, Fortinet Senior Business Manager at Ingram Micro, New Zealand’s largest distributor of Fortinet’s cyber-security solutions, “covering key areas of security threats, productivity and performance. CTAP is an unobtrusive and safe opportunity for you to benchmark your security profile and uncover any potential vulnerabilities before they cause any unexpected interruptions.”
How CTAP works
The process is fast and won’t take up any of your network resources. “One of our specially-designated Fortinet Partners installs a FortiGate Next Generation Firewall at your facility,” says Khan, “and then monitors traffic logs, performance metrics and security events for up to seven days. The data will then be processed through FortiAnalyzer to quantify and report on application traffic traversing the network for intrusions, malware and malicious applications that could represent unacceptable risks to your network.”
At the end of the process, the Partner will prepare a CTAP Risk Assessment report that details actionable mitigation recommendations to address any vulnerabilities uncovered by the process. “These reports provide valuable insights into your network operations,” says Khan. “You’ll get charts that show HTTPS vs. HTTP usage and remote access and proxy application traffic. Plus you’ll get see any malware detected, IPS attacks detected, malicious websites detected and phishing websites detected as well as cloud usage charts (SaaS and IaaS) to better understand how sensitive data is moved offsite.”
The CTAP report is divided into three primary sections:
“Obtaining a Cyber Threat Assessment Report will give you unmatched insight into your current security posture and network activity,” concludes Khan. “If you have any questions at all about your network, the CTAP report will give you the answers you need. It is a no-obligation process, it won’t cost you a cent and you’ll get some very valuable information. So if you want to participate in this exciting initiative, give us a call and we’ll put you in touch with a Fortinet Partner with CTAP expertise. It will be time well-spent.”
Andrew Khan, Senior Business Manager Email: firstname.lastname@example.org M: 021 819 793
David Hills, Solutions Architect Email: email@example.com M: 021 245 0437
Hugo Hutchinson, Business Development Manager Email: firstname.lastname@example.org P: 09-414-0261 | M: 021-245-8276
Marc Brunzel, Business Development Manager Email: email@example.com M: 021 241 6946