sb-nz logo
Story image

Fortinet’s Advanced Threat Protection: Secure your sensitive data, ensure your privacy

18 Feb 2016

Advanced persistent threats are especially nasty. Cybercriminals (the skilled ones, at least) have moved beyond simple intrusions, viruses and worms. Nope, these people want to steal your data, for whatever reason. Your data has value. And the bad guys are willing to invest time and money to break into your network. They have upped the ante.

“Advanced persistent threats are just that - advanced and persistent,” says Andrew Khan, Fortinet Senior Business Manager at Ingram Micro, New Zealand’s largest distributor of Fortinet’s advanced threat protection (ATP) and cybersecurity solutions. “The attack is multi-faceted. They might try to get into your system via email and social engineering; they might target an unsecured mobile phone to gain access and then move sideways into the sensitive data. They look for unprotected ports. Or they’ll try to use brute force to get a weak password. And, if you are a high value target, they’ll keep trying until they get stopped or get through.”

Five key steps to ATP So what can you do? The answer is to fight multi-faceted threats with defence-in-depth to reduce the attack surface. There are five critical components to advanced threat protection:

  • Access control
  • Threat prevention
  • Threat detection
  • Incident response
  • Continuous monitoring

These components, working in concert and kept current, can go a long way in protecting your network, data and reputation.

Access control Access control reduces the attack surface by forcing all users and traffic through established inspection points running appropriate threat prevention and detection technologies. Solutions include Layer 2/3 firewalls, patch management and two-factor authentication. A security-centric infrastructure with a hardened OS provides pervasive security.

Threat prevention Threat prevention stops malware before it enters the network. Most attacks utilise modified versions of known malware to bypass content-oriented inspection. Threat prevention technologies - such as intrusion prevention, application control, web/email filtering and anti-virus/spam - keep the windows and doors shut. Proactive solutions, typically subscription-based services from organisations such as Fortinet’s FortiGuard Labs, can identify and stop most malware.

Threat detection If you do detect a threat - or even suspect that your perimeters have been breached - you need to take immediate action. For instance, you can ‘sandbox’, run objects in a contained environment, to isolate threats. Similarly, botnet detection uncovers communication patterns indicating botnet activity.

Incident response If a security event occurs, incident response actions kick in to validate and contain the threat. All components, including those deployed for detection and prevention, need to work in concert for fast response and corrective action.

Continuous monitoring Containment and response leads into continuous monitoring for ongoing assessments and audits. These activities identify and specify the effectiveness of an organisation’s security, the state of security amongst their peers and the continued evolution in the threat landscape.

“If you can provide these five components inside a homogeneous security-centric framework,” concludes Khan, “you’ll be going a long way to keep your data safe and your reputation intact. Fortinet is leading the charge against these advanced persistent threats and we can help you keep your networks more secure. Give us a call (below) and we can show you how.”

For further information, please contact:

Hugo Hutchinson, Business Development Manager Email :hugo.hutchinson@ingrammicro.com Mobile :021 245 8276

Marc Brunzel, Business Development Manager Email: marc.brunzel@ingrammicro.com Mobile:  021 241 6946

Andrew Khan, Senior Business Manager Email: andrew.khan@ingrammicro.com Mobile : 021 819 793

Link image
Automation: The key to business excellence across the board
In 2020, businesses that don't invest in automation face serious risk of falling behind. If it exists in IT, there's a way to automate it - find out how with a free consultation.More
Link image
Scale-out multi-protocol storage & data management with Hedvig
The advantages of data growth are clear if they are harnessed properly: Agility, scalability, and lower costs are but a few of those advantages. Find out how you can make these a reality with Hedvig.Register Here
Download image
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.More
Story image
Fortinet resolves to help communities through new Corporate Foundation
“Through the establishment of a Corporate Foundation, we are extending investments in security training and education, employee community engagement and disaster relief efforts to empower and protect our communities, as well as positively impact our business, employees, customers and shareholders.”More
Story image
5G to be 'revolutionary' - yet security concerns remain high
“The introduction of 5G will alter consumer expectations and lead to a change in how businesses deliver services."More
Story image
Fortinet’s Security Fabric: Optimised for a remote workforce
Cornelius Mare, Fortinet A/NZ Director Security Solutions, explains how a comprehensive security fabric can help protect and enable a mobile / remote workforce.More