
Обзор
Know Your Security Posture
FortiGuard Security and Brand Assessment provides targeted cybersecurity assessments for insights into potential security gaps and vulnerabilities across the attack surface and cycle. You can choose from a variety of assessments to gain insights into the areas you’d like. This will enable heightened focus and risk-based prioritization to support a detailed plan for readiness that aligns with your goals.
Assessment Services
Brand Protection Assessment
FortiRecon Brand Protection provides a brand-specific view of threats. It provides early warnings of brand and reputation risk such as credential breaches, typo-squatting and defacements, rogue applications, harmful social media posts, brand impersonation, phishing, and other digital risks.
ПодробнееCloud Security Posture Assessment
Fortinet’s Cloud Security Posture Assessment (CSPA) service can assess your public cloud environments to identify potential risks, along with recommendations to improve your overall security posture.
ПодробнееExternal Attack Surface Assessment
FortiRecon EASM continuously assesses an organization’s digital surface. It discovers, identifies, and alerts to new weaknesses and vulnerabilities, and new digital assets. It provides immediate visibility to, and remediation actions for, any new asset, vulnerability, or public exposure.
ПодробнееPenetration Testing-as-a-Service
FortiPenTest provides cloud-based security testing-as-a-service that simplifies automated detection of critical vulnerabilities in websites/web applications including the OWASP Top 10. The service can help identify common vulnerabilities and misconfigurations.
ПодробнееRansomware Readiness Assessment
Fortinet’s Ransomware Readiness Assessment assesses an organization’s controls and capabilities relevant to ransomware tools, techniques, and procedures (TTPs). Each assessed domain consists of maturity practices used to assess readiness and uncover any gaps when dealing with a ransomware attack
ПодробнееFeatures and Benefits
Understand Weaknesses
Discover your gaps and vulnerabilities in technology, processes, and people.
Prioritize Actions
Get help from data-driven decision-making for cybersecurity actions and investments.
Close the Gaps
Prevent attacks possible due to inadvertent and unknown exposures.
Be Proactive
Take down illegitimate websites, rogue mobile apps, and more.
Grow Team Strengths
Gain insights and build a broader skillset based on lessons learned.