Fortinet
Unveils New Digital Risk Protection Offering to Empower Security and Executive
Teams with an Attacker’s View of the Enterprise
FortiRecon combines machine learning,
automation, and human intelligence to continually monitor an organization’s
external attack surface, determine its brand risk, and deliver custom intel to
act earlier and faster on threats
John
Maddison, EVP of Products and CMO at Fortinet
“The sooner in the attack cycle you identify and stop an adversary, the less
costly and damaging their actions. Employing a powerful combination of human
and artificial intelligence, FortiRecon provides organizations with a view of
what adversaries are seeing, doing and planning. FortiRecon’s vendor agnostic
SaaS delivery model combined with an intuitive interface and easily digestible
reports enable executives across the organization to quickly understand the
risks posed to their company, data, and brand reputation, while our team of
FortiGuard Labs cybersecurity experts enhance the offering with takedown
services, guidance on prioritization of remediation efforts, and targeted threat
research and intelligence.”
News
Summary
Fortinet®, a global
leader in broad, integrated, and automated cybersecurity solutions, announced FortiRecon, a complete Digital
Risk Protection Service (DRPS) offering that uses a powerful combination of
machine learning, automation capabilities, and FortiGuard
Labs cybersecurity experts to manage a company’s risk posture and
advise meaningful action to protect their brand reputation, enterprise assets,
and data. FortiRecon uniquely delivers a triple offering of outside-in coverage
across External Attack Surface Management (EASM), Brand Protection (BP), and
Adversary-Centric Intelligence (ACI) to counter attacks at the reconnaissance
phase – the first stage of a cyberattack – to significantly reduce the risk,
time, and cost of later stage threat mitigation.
Organizations
are Overwhelmed in the Fight to Protect their Network, Data, and Reputation and
Mitigate Risk Early
Before attacking an organization, a cybercriminal’s primary objective is to
gather as much intelligence about their target as possible. This phase of early
reconnaissance arms the adversary with everything they need to determine if and
how they would exploit an organization. They will test a company’s defense and
response tactics, look for unpatched systems, use social media to learn more
about its employees and their normal behavior, and go as far as researching
business partners, recent acquisitions, and any other third-party affiliation
that could lead to a successful compromise. As organizations digitally
accelerate their businesses and deploy hybrid IT
architectures that expand the attack surface, identifying and
mitigating these threats has become increasingly more difficult. In response to
the velocity of threats, cybersecurity best practices have evolved from
point-in-time evaluations to continual monitoring, ongoing reviews, and continuous
enhancements to an organization’s security posture.
Taking a
Page Out of the Adversary Playbook to Mitigate Risk
With the introduction of FortiRecon, Fortinet provides enterprise organizations
with a powerful tool to understand how the adversary views an organization from
the outside to help inform cybersecurity teams, the C-Level, and risk and
compliance management on how to prioritize risk and improve the company's
overall security posture. FortiRecon offers companies consistent and
comprehensive coverage across three areas:
- External Attack Surface
Monitoring: Empowers
organizations to understand their risk profile and mitigate risks early.
Provides an outside-in view of an organization and its subsidiaries to
identify exposed known and unknown enterprise assets and associated
vulnerabilities, and prioritize the remediation of critical issues. EASM
identifies servers, credentials, public cloud service misconfigurations,
and even third-party partner software code vulnerabilities that could be
exploited by malicious actors.
- Brand Protection: Enables organizations to
protect their brand and identify risks to their customers.
Proprietary algorithms detect web-based typo-squatting, defacements, and
phishing impersonations, as well as rogue mobile apps, credential leaks,
and brand impersonation on social media, all common techniques used by
cyber threat actors. The early detection of malicious activity allows
teams to quickly take action (such as website or application takedown) to
stop and prevent damage.
- Adversary-Centric
Intelligence: Increases
the security awareness of an organization’s SOC team with industry and
geography specific coverage to better understand their attackers and
protect assets. FortiGuard Labs cybersecurity experts assess the
underground and imminent threat risks posed by active cybercriminals to an
individual company by proactively monitoring public and private forums,
open-source, dark web, and other cybercriminal domains. By engaging in
human intelligence collection, FortiGuard Labs experts assess and curate
custom threat intelligence, providing recommendations specific to the
company, industry, and geography.
Source: Fortinet media announcement