Cyber Threat Assessment For Education

Today, one of our engineers is heading to Plymouth armed with a Fortigate to kick off a Cyber Threat Assessment for a customer in the Education sector.

What’s a cyber threat assessment?

The cyber threat assessment (CTAP) is one of the tools we have in our kitbag to help our customers determine how well their current network deals with cyber security threats with follow up recommendations if improvements can be made, which can vary from simple configuration changes, to policy breaches requiring stronger enforcement.

What does the assessment involve?

Given the size of this education provider, we’re putting in a Fortigate 1500D, although we could use Fortigate 100D’s and Fortigate 300D’s depending on the size of the organisation. That unit will be in place for the next two weeks and during that time, it will sit on their network gathering data against pre-defined key indicators. At the end we’ll produce a report for the customer to see any threats that currently reside on their network and our security engineers will make some recommendations for improvements.

Here are just some of the things the Cyber Threat Assessment covers:

  • Network security solution effectiveness
  • Application vulnerabilities
  • Malware/botnets detection
  • “At risk” devices within the network
  • Applications and web resources usage within the network
  • Peer to peer, social media, instant messaging share of the network usage
  • Usage of client-server and web-based applications in alignment with corporate policies
  • Network performance improvement area
  • Throughput, session and bandwidth requirements during peak hours
  • Security solution sizing and optimisation

Is the CTAP suitable for my organisation?

We have carried out CTAPs for companies of all sizes, across the UK including Wales, The North West, the Midlands and The South West, including the M4 Corridor.

There’s no charge for this and we will come to you to help set up the Fortigate – we set the device in Transparent Mode using Port pairs or as one-arm sniffer using port mirroring to ensure there’s no disruption to your existing security set-up and generally speaking, we gather data for around 10 to 14 days.

If this sounds like the sort of thing that could be of use to you, get in touch now.