Story image

Identifying your network security threats with Fortinet’s Cyber Threat Assessment Program

30 Aug 2016

You can’t protect yourself from what you don’t know. Cyber-space is a dangerous environment and the number and types of threats to the data and applications on your network are expanding, even as you read this article. Every day you read about hacks, intrusions and malware wreaking havoc on the unsuspecting. And by the time you realise that you are at risk it might be too late. The first step in any network security risk management initiative should be to identify the threats and quantify the risks.

Easier said than done. But not with Fortinet’s recently launched Cyber Threat Assessment Program (CTAP). If you have any doubts what-so-ever about the effectiveness of your current cyber-security protection and network visibility, you can now get, free-of-charge, a second opinion from Fortinet.

“Fortinet’s Cyber Threat Assessment Program (CTAP) will provide you with in-depth information about the current state of your network,” says Andrew Khan, Fortinet Senior Business Manager at Ingram Micro, New Zealand’s largest distributor of Fortinet’s cyber-security solutions, “covering key areas of security threats, productivity and performance. CTAP is an unobtrusive and safe opportunity for you to benchmark your security profile and uncover any potential vulnerabilities before they cause any unexpected interruptions.”

How CTAP works

The process is fast and won’t take up any of your network resources. “One of our specially-designated Fortinet Partners installs a FortiGate Next Generation Firewall at your facility,” says Khan, “and then monitors traffic logs, performance metrics and security events for up to seven days. The data will then be processed through FortiAnalyzer to quantify and report on application traffic traversing the network for intrusions, malware and malicious applications that could represent unacceptable risks to your network.”

Reporting

At the end of the process, the Partner will prepare a CTAP Risk Assessment report that details actionable mitigation recommendations to address any vulnerabilities uncovered by the process. “These reports provide valuable insights into your network operations,” says Khan. “You’ll get charts that show HTTPS vs. HTTP usage and remote access and proxy application traffic. Plus you’ll get see any malware detected, IPS attacks detected, malicious websites detected and phishing websites detected as well as cloud usage charts (SaaS and IaaS) to better understand how sensitive data is moved offsite.”

The results

The CTAP report is divided into three primary sections:

  • Security and threat prevention – For firewall assessment and security breach probability you’ll see which application vulnerabilities are being attacked in your network, which malware/botnets were detected and which devices are ‘at risk’.
  • User productivity – For application visibility control, you’ll see which peer-to-peer, social media, instant messaging and other apps are running.
  • Network utilisation and performance – For network utilisation and performance optimisation you’ll receive hard data on throughput, session and bandwidth usage requirements during peak hours.

“Obtaining a Cyber Threat Assessment Report will give you unmatched insight into your current security posture and network activity,” concludes Khan. “If you have any questions at all about your network, the CTAP report will give you the answers you need. It is a no-obligation process, it won’t cost you a cent and you’ll get some very valuable information. So if you want to participate in this exciting initiative, give us a call and we’ll put you in touch with a Fortinet Partner with CTAP expertise. It will be time well-spent.”

For further information, please contact:

Andrew Khan, Senior Business Manager Email: andrew.khan@ingrammicro.com M: 021 819 793

David Hills, Solutions Architect Email: david.hills@ingrammicro.com M: 021 245 0437

Hugo Hutchinson, Business Development Manager Email: hugo.hutchinson@ingrammicro.com P: 09-414-0261 | M: 021-245-8276

Marc Brunzel, Business Development Manager Email: marc.brunzel@ingrammicro.com  M: 021 241 6946

Apple's AirPods now come with 'Hey Siri' functionality
The new AirPods come with a standard case or a Wireless Charging Case that holds additional charges for more than 24 hours of listening time.
NZ investment funds throw weight against social media giants
A consortium of NZ funds managing assets worth more than $90m are appealing against Facebook, Twitter, and Google following the Christchurch terror attacks.
Poly appoints new A/NZ managing director, Andy Hurt
“We’re excited to be bringing together two established pioneers in audio and video technology to be moving forward and one business – Poly."
NVIDIA announces Jetson Nano: A US$99 tiny, yet mighty AI computer 
“Jetson Nano makes AI more accessible to everyone, and is supported by the same underlying architecture and software that powers the world's supercomputers.”
Unity and NVIDIA announce real-time ray tracing across industries
For situations that demand maximum photorealism and the highest visual fidelity, ray tracing provides reflections and accurate dynamic computations for global lighting.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
NVIDIA introduces a new breed of high-performance workstations
“Data science is one of the fastest growing fields of computer science and impacts every industry."
Apple says its new iMacs are "pretty freaking powerful"
The company has chosen the tagline “Pretty. Freaking powerful” as the tagline – and it’s not too hard to see why.