You are on page 1of 8

FortiRecon

Digital Risk Protection Service from Fortinet


Digital Risk Protection Service
 Your external attack surfaces can provide numerous potential intrusion points for cybercriminals exploit to
penetrate your organization. Misconfigured servers, vulnerable software, Shadow IT assets and leaked credentials
can pose an immediate threat, however, organizations’ security teams often do not have the resource to monitor,
nor do they have the tools to track and identify these types of risks to the organization’s perimeter.

 FortiRecon is a Digital Risk Protection (DRP) service from Fortinet. It's a Software-as-a-Service (SaaS)
product that helps security teams gain visibility into their infrastructure and the tactics and techniques used to
breach similar organizations
Introduction
 FortiRecon scans the organization's attack surface and identifies risks to assets while FortiGuard Threat Intelligence
delivers early warning of risks to the organization through targeted, curated intelligence to provide an early warning
of any malicious activity targeted to the organization.

 The FortiRecon portal includes the following modules:

 (EASM) The External Attack Surface Management (EASM) module provides an adversary’s view of the organization
digital attack surface and prioritizes risks and exposures, enabling administrators to mitigate threats in a controlled
manner before the threats become a problem.
 (Brand Protection) The Brand Protection (BP) module continually monitors the organization’s publicfacing visibility
for unauthorized changes, including web-based phishing attacks, typo-squatting, rogue applications, credential leaks,
and brand impersonation in social media, which may impact brand value, integrity, and trust.
 (ACI) The Adversary Centric Intelligence (ACI) module leverages FortiGuard Threat Analysts to provide
comprehensive coverage of dark web, open source, and technical threat intelligence, including threat actor insights.
This information enables administrators to proactively assess risks, respond faster to incidents, better understand their
attackers, and protect assets.
External Attack Surface
Management (EASM)

 FortiRecon External Attack Surface


Management (EASM) provides an external
outside-in view of the organization and its
subsidiaries, to identify exposed known and
unknown enterprise assets and associated
vulnerabilities to help prioritize the
remediation most critical issues. EASM will
helps identify servers, credentials, public
cloud service misconfigurations and third-
party partner software code vulnerabilities
that could be exploited by malicious actors.
Brand Protection
(BP)

 FortiRecon Brand Protection (BP) uses


proprietary algorithms to detect web based
phishing attacks, typo-squatting, defacements,
rogue apps, credential leaks and brand
impersonation in social media common
techniques used by Cyber Threat Actors.
 By detecting activity early and taking action
such as web-site or application takedown,
Brand Protection helps organizations to
protect their brand value, trust, integrity, and
reputation.
Adversary Centric Intelligence
(ACI)
The Adversary Centric Intelligence (ACI) module leverages FortiGuard Threat Analysts
to provide comprehensive coverage of dark web, open source, and technical threat
intelligence, including threat actor insights. This information enables administrators to
proactively assess risks, respond faster to incidents, better understand their attackers,
and protect assets

The Adversary Centric Intelligence


module

 Card Fraud
 Stealer Infections  Vendor Risk Assessment
 OSINT - Cyber Threats  Intelligence Collection Lookup
 Vulnerability Intelligence  Investigation
 Ransomware Intelligence
Fortinet Products
No.
Product Explanation
1 FortiADC Application delivery controller

2 FortiAnalyzer Centralized logging and reporting solution

3 FortiAuthenticator User identity management server


4 FortiCASB Cloud access security broker
5 FortiClient
Advanced endpoint security
6 FortiEDR
7 FortiCNP Cloud-native protection solution
8 FortiDDos DDoS mitigator
9 FortiDeceptor Deception-based solution

10 FortiExtender 5G/LTE & remote Ethernet gateways

11 FortiGate Network security platform


12 FortiIsolator Browser isolation platform
13 FortiMail Messaging security server
14 FortiManager Centralized management platform
15 FortiNAC Network access control solution
16 FortiPAM Privileged access management
17 FortiSandbox Advanced threat prevention system

18 FortiSIEM Unified event correlation and risk management solution

19 FortiSASE Allows clients to securely access the Internet with the protection from FortiOS

20 FortiSOAR Security orchestration, automation and response (SOAR) solution


21 FortiSwitch Secured access switch
22 FortiTester Network tester
23 FortiToken Two-factor authentication token
24 FortiVoice Secure VoIP solution
25 FortiWeb Web application firewall

You might also like