0% found this document useful (0 votes)
97 views5 pages

Forticnp: Prioritize Risk Management Activities

Uploaded by

Luis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views5 pages

Forticnp: Prioritize Risk Management Activities

Uploaded by

Luis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DATA SHEET

FortiCNP
Available for:

Cloud

Prioritize Risk Management Activities

The rapid adoption of Cloud computing is causing security Key Benefits


teams to operate in a reactive state to provide adequate n Reduced time to identify,
security coverage for the increasing volume of cloud triage and prioritize cloud risk
remediation work
workloads. This situation means they are unable to handle the
n Maximizing the value of Cloud
volume of alerts created by all the security tools.
Native Security Services
FortiCNP, Fortinet’s cloud-native protection product helps n Maximizing the Value of
security teams prioritize risk management activities based on Fortinet cloud security
products
a broad set of security signals from their cloud environments.
Beyond the built-in CSPM and data scanning capabilities,
FortiCNP collects information from multiple cloud native Key Features
security services that provide vulnerability scanning, n Cloud Risk Prioritization
permissions analysis, and threat detection as well as Fortinet n Vulnerability Management
cloud security products. n CloudSecurity Posture
Management
Based on the information it collects, FortiCNP calculates an
n Malware Scanning
aggregate risk score for cloud resources, so customers can
n Cloud Native Security
then control risk management work based on resource risk
Integration
insights (RRI) FortiCNP produces.
n Workflow Integration
FortiCNP is unlike traditional CSPM and CWPP products
that require agents, excessive permissions, and produce
unmanageable volumes of data. By integrating with cloud
native security services and other Fortinet Security Fabric
products, FortiCNP provides deep security visibility across
cloud infrastructures and helps prioritize security workflows for
effective risk management.

1
DATA SHEET | FortiCNP

FEATURE HIGHLIGHTS

Resource Risk Insights


Resource Risk Insights (RRI) turns overwhelming volumes of data into actionable
insights. By correlating information from a breadth of cloud native and Fortinet
security products into a comprehensive cloud risk graph database, FortiCNP creates
a current and accurate map of risk interdependencies for your cloud environment.
You can customize RRIs based on environmental and workload specific attributes
to best suit your environment. RRIs are based on analysis of configurations,
vulnerabilities, permissions, accessible data, threats, and the relationship between
these findings.

“FortiCNP gives us comprehensive cloud visibility with an intuitive Related Products


dashboard that allows us to easily track risk management over time,”
The following Cloud Native
said Caio Hyppolito, CTO at BK Bank. “Most importantly, it enables our
Services provide FortiCNP
team to focus on securing high priority resources instead of spending
security findings to make insights
time working through long lists of security findings. Integrations with
more accurate
the products we already have allow us to get even more value out
of our deployment and enables broader visibility and easier, more n Amazon GuardDuty
proactive cloud security management.” n Azure Security Center
n Amazon Inspector
Malware Scanning
n FortiGate-VM
FortiCNP Malware Scanning utilizes FortiGuard Labs malware scanning technology
across all data stores in your cloud environment to protect from the potential impact n FortiWeb Cloud
of dormant malware. Instead of scanning workloads in runtime, which requires
deploying agents that detect malware after the fact, FortiCNP provides the ability
to detect malware throughout the data supply chain by scanning cloud data stores, Additional Information
disk volumes, and workload images1. More information can be found
at: www.forticnp.com
Cloud Native Integration
FortiCNPs RRI technology allows you to enjoy the ease of deployment offered by
cloud provider security services, without the associated alert fatigue. This model
eliminates the painful process of agent deployment and takes advantage of single
click deployment of cloud native security services. Once activated, FortiCNP ingests
findings from these services, correlates them, and presents you with actionable
insights. Some of the integrated services include:
§ Vulnerability Assessment Services
§ Entitlement Management Services
§ Threat Detection Services
§ Data Scanning and Classification Services
§ Fortinet Security Fabric (FortiGate, FortiWeb)
“Deploying multiple third party tools in the cloud can be an endless
task – utilizing the cloud native tools while rationalizing their output,
and correlating it with security information we get from other Fortinet
products saves us time and delivers results…”

Roger Rustad, Security Engineer, Fortinet CISO Office.

1. Disk volume and workload image scanning to be available in next release.

2 2
DATA SHEET | FortiCNP

TECHNICAL SPECIFICATIONS

FEATURES
DESCRIPTION INTEGRATIONS
FortiCNP scans and monitors customer cloud AWS Security Hub
Cloud Security Posture
configurations to evaluate best practices and Azure Security Center
Management
detect misconfiguration risk. GCP Security Health Analytics
Vulnerability FortiCNP analyzes the impact of vulnerabilities Amazon Inspector
Management against your cloud resources to assess risk. Microsoft Defender for Cloud
FortiCNP ingests information from Cloud Native Amazon GuardDuty, VPC Flow Logs, CloudTrail
Threat Detection security services and Fortinet products for Microsoft Defender for Cloud, NSG Flow Logs
Workload and Network threat detection findings. CloudTrail, VPC Flow Logs
Entitlement FortiCNP incorporates permission information
Management to correlate the impact of risk across different
resources.
Data Security FortiCNP scans for malware in data and utilizes Amazon S3
data classification information from cloud native Azure Blob
tools to evaluate the impact of security risk on or GCP Cloud Storage
from your data.
Kubernetes Security FortiCNP integrates with Kubernetes Environments Amazon EKS
to scan configuration and monitor traffic flows. Azure AKS
Google Kubernetes Engine
Self-Managed Kubernetes
Container Registries FortiCNP Scans container registries for Amazon ECR
vulnerabilities allowing DevOps teams to pass or Azure Container Registry
fail build pipelines based on scan results. Google Container Registry
Harbor Container Registry
OpenShift Container Registry
Docker Hub
Ticketing and Ci/CD FortiCNP allows security analysts to interact with JIRA
Integration other teams in the ways that are most natural to ServiceNow
the organization. Jenkins
Reports FortiCNP provides point in time risk snapshot and
compliance reports to non FortiCNP users.
AWS SERVICE INTEGRATION DESCRIPTION
Resource API The AWS Resource API is used to collect information regarding your cloud resources in a read-only
manner.
Organizations AWS organizations are used to import environments that include more than a single AWS account
and are organized using the AWS organizations feature.
CloudTrail FortiCNP ingests CloudTrail events to identify changes to your environment.
VPC Flow Logs VPC Flow logs are used to establish traffic patterns in your environment as well as detect deviations
from normal patterns.
Security Hub AWS Security Hub is used to collect all security information from AWS services such as GuardDuty,
Inspector and others. FortiCNP utilizes the finding normalization and aggregation capabilities of
Security Hub. Security Hub Controls are not used by FortiCNP.
GuardDuty GuardDuty Threat Detection Service is used by FortiCNP to cross correlate risk with imminent
threats and prioritize.
Inspector Inspector Vulnerabilities are used to establish package, library and network configuration
vulnerability risk.

3
DATA SHEET | FortiCNP

TECHNICAL SPECIFICATIONS
FEATURES
AZURE SERVICE INTEGRATION DESCRIPTION
REST API The Azure REST API is used to collect information regarding your cloud resources in a read-only
manner.
Azure Log Analytics Azure Log Analytics is used to collect information from the Azure platform and detect any changes
to resource configurations.
Azure NSG Flow NSG Flow Events are used to establish traffic patterns in your environment as well as detect
Events deviations from normal patterns.
Azure Security Center Azure Security Center provides FortiCNP with information from Microsoft Defender for detecting
vulnerabilities and threats for cloud workloads.
GCP INTEGRATION DESCRIPTION
Google Cloud API The GCP API is used to collect information regarding your cloud resources in a read-only manner.
VPC Flow logs are used to establish traffic patterns in your environment as well as detect deviations
GCP VPC Flow Logs
from normal patterns.
Cloud Logs are used to collect information from GCP and detect any changes to resource
Google Cloud Logs
configurations.

4 4
DATA SHEET | FortiCNP

ORDER INFORMATION
PRODUCT SKU DESCRIPTION
BRING YOUR OWN LICENSE (BYOL)
Cloud Native Protection FC1-10-FCWPW-315-02-DD* FortiCNP Cloud Native protection – Risk, Threat and Data insights for 20 resources in all supported public cloud
environments.
FC2-10-FCWPW-315-02-DD* FortiCNP Cloud Native protection – Risk, Threat and Data insights for 100 resources in all supported public cloud
environments.
Data Protection FC2-10-FCWPS-316-02-DD* FortiCNP Data Protection Standard. License for malware and anti-virus scanning of 100GB of data. Requires FortiCNP
protected resource license. Cannot be combined with FortiCNP Data Protection, Advanced.
FC2-10-FCWPS-317-02-DD FortiCNP Data Protection Advanced (Standard plus DLP scanning) - License for pattern-matching (DLP), malware and anti-
virus scanning of 100GB of data. Requires FortiCNP protected resource license. Cannot be combined with FortiCNP Data
Protection, Standard.
FC5-10-FCWPS-316-02-DD FortiCNP Data Protection Standard. License for malware and anti-virus scanning of 1TB of data. Requires FortiCNP
protected resource license. Cannot be combined with FortiCNP Data Protection, Advanced.
FC5-10-FCWPS-317-02-DD* FortiCNP Data Protection Advanced (Standard plus DLP scanning) – License for pattern-matching (DLP), malware and
anti-virus scanning of 1TB of data. Requires FortiCNP protected resource license. Cannot be combined with FortiCNP Data
Protection, Standard.
Container Protection FC1-10-FCWPC-327-02-DD* FortiCNP Container Protection. Subscription per 4 container hosts/worker nodes.
AWS MARKETPLACE
Monthly Base monthly subscription Minimal subscription protecting 20 workloads and scans up-to 100GB of data for malware.

Protected Cloud Resources Additional protected resources that were protected during the month using highest watermark metering. Increments of 1.
Scanned Data Volume of data that has been scanned for the month beyond the first 100GB. Increments of 1.
Annual Base Annual Subscription Minimal subscription protecting 100 workloads and scans up to 1TB of data for malware.
Protected Cloud Resources Allocation of additional protected resources for the year. Increments of 100.
Scanned Data Volume of data scanning capacity beyond the first 1TB. Increments of 10TB.
Overage Any exceeded capacity for protected workloads or data scanning charged per monthly prices.

* Denotes TBA

www.fortinet.com

Copyright © 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.

Fortinet is committed to driving progress and sustainability for all through cybersecurity, with respect for human rights and ethical business practices, making possible a digital world you can always trust. You represent and warrant to Fortinet that you will not use Fortinet’s
products and services to engage in, or support in any way, violations or abuses of human rights, including those involving illegal censorship, surveillance, detention, or excessive use of force. Users of Fortinet products are required to comply with the Fortinet EULA
(https://www.fortinet.com/content/dam/fortinet/assets/legal/EULA.pdf) and report any suspected violations of the EULA via the procedures outlined in the Fortinet Whistleblower Policy (https://secure.ethicspoint.com/domain/media/en/gui/19775/Whistleblower_Policy.pdf).

FCNP-DAT-R01-20220707

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy