Developers: | Fortinet |
Date of the premiere of the system: | 2016/03/09 |
Technology: | Firewall |
Cyber Threat Assessment Program (CTAP) is the global program of assessment of cyberthreats for detection of serious security risks. The program is intended for detection of earlier unknown threats and development of strategy of their elimination.
On March 9, 2016 the Fortinet company officially submitted the new program of assessment of cyberthreats Cyber Threat Assessment Program (CTAP). The program purpose — to provide to the organizations detailed data on types and the number of cyberthreats which can get into corporate networks bypassing the existing means of protecting.
Being a part of more large-scale strategy of Fortinet company and department of a research of threats FortiGuard Labs, the program is directed to integration of recommendatory function into the complex platform of security. Using the program, consumers will gain more fair presentation about the cyberthreats changing in time.
Fortinet together with partners developed the free program of assessment of threats for the organizations. During preparation for carrying out assessment procedure, in network of the client the high-performance FortiGate firewall is installed, he checks intra network traffic of applications, looks for violations, the malware and applications by means of which malefactors can get access to files of confidential data and cause to the company client significant damage. Having completed data collection, using FortiAnalyzer the detailed report about threats containing data on traffic of applications, productivities of users, use of network, the general exposure of network to risk and the accompanying business risks is created. The report contains the detailed description of actions for elimination of threats.
In the past firewalls detected much more effectively network threats as traffic could be classified according to protocols, and the strategy of malefactors were not so sophisticated. — Now the number of the threats created especially for a bypass of traditional firewalls steadily grows. Our new CTAP program is developed for fast detection of threats which other means of protecting did not manage to intercept. With its help clients will be able to achieve increase in efficiency of security systems and to reduce business risks. John Maddison, senior vice president of department of products and solutions of Fortinet
|
These companies allow to draw conclusions:
- Irrespective of the size and an organizational form, the company face a huge number of serious threats: the number of the attacks to which networks underwent exceeds 32.14 million. In network such notorious samples of the malware as Conficker, Nemucod and ZeroAccess continue to extend. During the analysis 5230 copies of Conficker, 4220 copies of Nemucod and 3210 copies of ZeroAccess were revealed.
- Traffic of social networks and media streams makes 25.65% of all network traffic. It increases risk of defeat of corporate networks and confidential data by means of the hidden loadings, social engineering and harmful advertizing. The largest volume of traffic falls to the share of social network Facebook — 47.27% of traffic of social networks. At the same time 42.29% of traffic of stream contents pass through YouTube service.
- During Application Control implementation administrators constantly face difficulties. Growth of volume of traffic in the peer-to-peer networks (generally it is data exchange using the Bittorrent protocol and network games) promotes hit in network of harmful contents for which distribution the applications and files loaded from the popular websites are used. In the course of implementation the politician of Application Control in corporate networks it is necessary to observe precautionary measures.
- As plunder of financial data as a result of penetration into networks of banks and financial institutions brings to malefactors the most considerable income, these organizations most often become subjects to the attacks: more than 44.6% of stocks of cybercriminals fall to their share. For penetration into networks of financial institutions and movement in them malefactors use the flash-like attacks, sophisticated trojans and the strategy of defeat of networks.
The organizations constantly are exposed to cyber attacks. The quantity of the directions of the attacks sharply increased, the steel ecosystems used by malefactors more advanced. To protect IT resources in these conditions, the companies should show special vigilance. The program of assessment of cyberthreats Fortinet is intended for the careful analysis of traffic in corporate networks and search of indicators of violations. As a result of program implementation the client receives the recommendations about risk reduction and increase in efficiency of network. |