Fortinet Prevents Undetected Malware Intrusion with Cyber Threat Assessment program
FREMONT, CA: Fortinet, a provider of high-performance cyber security solutions, unveiled its new Cyber Threat Assessment program designed to protect key resources from threats that goes undetected within the network perimeter defense.
Risk and advisory capabilities will be integrated to this end-to-end security platform to provide customers a greater insight into dynamically changing cyber risks that threaten their businesses.The FortiGate high-performance next generation firewall will be installed within the customer network to monitor the application traffic traversing the network for intrusions, malware and malicious applications. While at the end of data collection, a Risk Assessment Report will be generated to provide an analysis of the application traffic, user productivity, network utilization, the overall security risk, and the related business risk. Based upon the report, the program will recommend actionable mitigation steps that companies will follow to prevent cyber intrusion.
By offering a deeper analysis of existing or possible threats, customers are given a clear assessment of the risks to their environments. With its Internal Segmentation Firewall deployments, Fortinet protects key customer resources from threats that originate within the network, or to mitigate the damage and protect key resources from threats that get past traditional network perimeter defenses.
"The growing number of network threats today are designed to avoid detection by bypassing traditional firewalls with ease. Our new Cyber Threat Assessment program is specifically designed to quickly detect the threats other solutions are not intercepting to help customers significantly increase protection, while decreasing business risks," says John Madison, vice president of marketing, Fortinet.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....