4. 4
3 AREAS OF ANALYSIS
SECURITY
& THREAT PREVENTION
USER
PRODUCTIVITY
NETWORK
UTILIZATION
5. 5
REPORTED DATA
» Network security solution effectiveness
» Application vulnerabilities
» Malware/botnets detection
» “At risk” devices within the network
» Applications and web resources usage within the network
» Peer to peer, social media, instant messaging share of the network usage
» Usage of client-server and web-based applications in alignment with corporate
policies
» Network performance improvement area
» Throughput, session and bandwidth requirements during peak hours
» Security solution sizing and optimization for your actual usage
6. 6
HOW THE CYBER THREAT
ASSESSMENT PROGRAM WORKS
Register for a
free assessment
on ctap.fortinet.com
1
Our experts will employ
a FortiGate to monitor
your network
2
The FortiGate will
collect network logs for
a predetermined time
3
We review Cyber
Threat Assessment
findings with you
4
11. 11
CTAP REPORT AT A GLANCE
Deployment details
and methodology
Executive summary Recommended
actions
Security and
Threat Prevention
Security and
Threat Prevention – Part 2
User productivity Web usage Network Utilization FortiGuard services
13. 13
IMPROVEMENT AREA ANALYSIS
After a week of log collection
Findings introduction thanks to the report
Enhancements proposal done by your trusted advisor