ctap
play

CTAP Connect GmbH Jakob-Anstatt-Str. 2 55130 Mainz T: +49 6131 - PowerPoint PPT Presentation

ASSESS YOUR NETWORK PERFORMANCE AND SECURITY CTAP Connect GmbH Jakob-Anstatt-Str. 2 55130 Mainz T: +49 6131 801370 F: +49 6131 8013710 E: vertrieb@cnct.de www.cnct.de 1 How the Cyber Threat Assessment Program Works Sichere


  1. ASSESS YOUR NETWORK PERFORMANCE AND SECURITY CTAP Connect GmbH Jakob-Anstatt-Str. 2 55130 Mainz T: +49 6131 801370 F: +49 6131 8013710 E: vertrieb@cnct.de www.cnct.de 1

  2. How the Cyber Threat Assessment Program Works Sichere Netzwerk-Architekturen müssen sich ständig weiterentwickeln um mit den Mit dem Cyber Threat Assessment neuesten Advanced Persistent Threat Schritt zu halten. Programm (CTAP) stellen wir Ihnen unvergleichliche Einblicke in Ihre Arbeitsweise: aktuelle Sicherheitslage und Netz- werkaktivität bereit. - zur Überwachung Ihres Netzverkehrs installieren unsere Experten eine FortiGate - für die Aufzeichnung stehen wahlweise zwei Bereitstellungsmodi zur Verfügung Scheuen Sie sich nicht und nutzen ONE-ARM SNIFFER Mode TRANSPARENT Mode Verwendung von Port-Mirroring Verwendung Port-Paare Sie unsere Expertenauswertung. - Besprechung der Erkenntnisse aus den drei aufgezeichneten Analysebereichen - Sicherheit und Bedrohungsprävention entdecken und bewerten von Anwendungsschwachstellen und Sicherheitsverletzungen - Benutzerproduktivität Transparenz über die Nutzung von Social Media, Instant Messaging und anderen Anwendungen - Netzwerkleistung Durchsatz, Sitzungs- und Bandbreitennutzung, Netzauslastung während der Spitzenzeiten - Aufzeigen von Optimierungsmaßnahmen auf Basis des Cyber Threat Assessment Reports 2

  3. How the Cyber Threat Assessment Program Works Our experts will employ a Register for a 1 2 FortiGate to monitor assessment Connect GmbH your network The FortiGate will We review Cyber 3 4 Threat Assessment findings collect network logs for with you a predetermined time 3 Confidential

  4. 2 DEPLOYMENT MODES ONE-ARM SNIFFER TRANSPARENT MODE USING PORT MIRRORING USING PORT PAIRS 4

  5. 3 AREAS OF ANALYSIS / REPORTED DATA SECURITY & THREAT PREVENTION » Network security solution effectiveness » Application vulnerabilities » Malware/botnets detection » “At risk” devices within the network USER PRODUCTIVITY » Applications and web resources usage within the network » Peer to peer, social media, instant messaging share of the network usage » Usage of client-server and web-based applications in alignment with corporate policies NETWORK UTILIZATION » Network performance improvement area » Throughput, session and bandwidth requirements during peak hours » Security solution sizing and optimization for your actual usage 5

  6. CTAP REPORT AT A GLANCE Deployment details Executive summary Recommended Security and and methodology actions Threat Prevention Security and User productivity Web usage Network Utilization FortiGuard services Threat Prevention – Part 2 6

  7. CYBER THREAT ASSESSMENT REPORT SAMPLE AVAILABLE IN • French • German • Spanish • Japenese • Korean • Hebrew 7

  8. Cyber Threat Assessment Program Summary  A Cyber Threat Assessment report will provide you with unprecedented insights into your network covering key areas of: » Security Threats – Uncover vulnerabilities, malware, botnets, etc. » Productivity – Learn about your typical application and web usage » Performance – Discover bandwidth and session utilization patterns  It’s QUICK – Less than 7 days of monitoring  It’s EASY – No interruption to your infrastructure  It’s FREE – No agreements to sign or POs to cut 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend