FortiDeceptor-100G Appliance,support both Local FDC manager and DAAS platform and up to 128 VLANS.

Tilgjengelighet: Ikke på lager
Sku: FDC-100G
47 012,00 kr eksl mva
Send til
*
*
Fraktmetode
Navn
Estimert leveringsdato
Pris
Ingen fraktalternativer
Beskrivelse

FortiDeceptor is Fortinet's non-intrusive, agentless deception platform that puts the power back into the hand of defenders, with the ability to deceive attackers into engaging with fake assets and ultimately revealing themselves.

A force multiplier to current security defenses, FortiDeceptor combines the concept of honeypot with threat analytics and threat mitigation capabilities. This is achieved by distributing a layer of deception assets across the network - decoys and tokens, such as fake keys and files on endpoints and servers - and creating a system of traps that look and operate like any other real asset across IT, OT, and IoT networks, intended to deceive, detect, and isolate known and unknown human and automated attacks.

With FortiDeceptor, instead of waiting for the threat actor to make a mistake and then detect their presence, you can now embrace an active defense approach where any step the attacker takes - whether they try to escalate privileges or run malware - becomes an opportunity for you to detect them.

Early threat detection, minimal network impact

FortiDeceptor works by deploying and running decoys from the FortiDeceptor console using available IP addresses. As decoys leverage unused IP addresses across the different network segments, they do not impact network availability and, to the attacker, they seem like an integral part on your network. These IP addresses do not correspond to any real host or device on the network. The FortiDeceptor platform consists of several deception components that together provide an authentic and scalable layer of deception assets that are identical to other assets across your network. These decoys are fake assets, such as industrial control systems, medical devices, ATMs, tank gauges, POS devices, IoT devices, network infrastructure, and more, that run real operating systems and services and generate fake but limited traffic to lure attackers to them, diverting them away from sensitive assets. FortiDeceptor provides an extensive inventory of decoys. You can also 'bring your own decoys' and upload your own golden images. To expand the deception layer event further, FortiDeceptor places breadcrumbs (or tokens) on real endpoints and servers. These are fake documents, files, or fake credentials, that attackers look to leverage to move laterally or encrypt. The breadcrumbs, which are indistinguishable from real files and credentials, are designed to deceive the attacker or malware to laterally move to the decoy. FortiDeceptor immediately detects any use of fake credentials, generates alerts, and automatically isolates the endpoint using built-in endpoint isolation capabilities or security orchestration, automation, and response (SOAR) playbooks.

Accelerated incident response

The solution generates high-fidelity, zero false-positive alerts, providing security teams with a unique advantage over malicious activity, and unparalleled visibility to detect and stop attacks, credential thefts, lateral movement, and malware activity. It also provides compensating security control when patching or when other security controls aren't an option. A good example of this is in OT environments where patches aren't available; even when patches are available, the time and effort required for maintenance is arduous. Once a malware or human attacker engages with a fake or a decoy asset, an alert is generated and sent to security information and event management (SIEM), SOAR, or any threat intelligence platform you're using. The decoy then starts capturing and analyzing the activities in real time and generates threat intelligence using eight built-in intelligence engines for detailed and accurate analysis. FortiDeceptor does not require highly skilled security analysts to deploy or manage the solution. It centralizes and automates the entire process - from deception deployment to evidence analytics to quarantined and unquarantined attacks to the implementation of dynamic protection layers.

Protection against evolving threats

To combat emerging threats, FortiDeceptor enables on-demand creation of deception decoys based on newly discovered vulnerabilities or suspicious activity, providing automated, dynamic protection across IT, OT, and IoT environments. Implement zero-day protection: attackers often target vulnerable assets first. With FortiDeceptor's advanced outbreak feature, you can now purposefully deploy decoys with recently disclosed vulnerabilities to attract, automatically detect, and quarantine malicious activities early in the kill chain. When a vulnerability is reported by FortiGuard Labs, the vulnerability emulator is automatically pushed as a feed to the outbreak decoy without requiring a software update. Rapid threat hunting to identify indicators of compromise (IOCs): FortiDeceptor's integration with SOAR provides on-demand deception asset deployment, triggered by SOAR playbooks to help hunt and quarantine any malicious activity. When suspicious activity is detected, a SOAR playbook can automatically initiate the deployment of decoys and tokens in that specific segment to help detect an attack and capture intel. In addition, FortiDeceptor offers integrations with leading security tools, as well as with the Fortinet Security Fabric, providing orchestrated threat mitigation and enriched attack intelligence.

Deception for OT and IoT environments

OT environments are diverse, with numerous, multi-vendor devices and systems often designed without built-in security. Hardening mostly legacy systems via monitoring agents or security patching to mitigate risks is not always an option due to continuity, costs, patch availability, and more. FortiDeceptor's decoys simulate various types of IT, OT, ICS, and IoT devices, as well as critical applications such as SAP and ERP that can be deployed across all levels of the Purdue model. FortiDeceptor works by automatically running active and passive asset discovery, creating asset inventory, and recommending optimized decoy placement across the IT and OT network. The FortiDeceptor Rugged 100G, designed specifically for harsh industrial environments.

Generelt
EnhetstypeSikkerhetsapparat
Bredde27.5 cm
Dybde22.5 cm
Høyde9.8 cm
Vekt5.73 kg
Prosessor / Minne / Lager
RAM48 GB DDR4 SDRAM
Flash-minne16 GB
HarddiskSSD 1 TB x 1 - 2.5"
Nettverkstilknytning
ProduktformfaktorSkrivebord
OverføringsteknologiKablet
DatakjedeprotokollGigabit Ethernet
Nettverks-/transportprotokollFTP, SMB, RTSP, HTTP, HTTPs, Telnet, XMPP, TFTP, TCP
Protokoll for fjernstyrt administrasjonSNMP, Telnet, HTTP, HTTPS, TFTP, SSH, Modbus, MQTT, RADIUS, BACnet
KapasitetVM-instanser: 8
VLAN støttet: opptil 128
StatusindikatorerStrøm, status
EgenskaperVLAN støttet, nullstillingsknapp, uten vifte, VPN-server
KrypteringsalgoritmeSSL
Tilpassede standarderUPnP
IP-telefoni
VolP-protokollerSIP, SRTP
Ekspansjon / Tilkoplinger
Grensesnitt6 x 1000Base-T - RJ-45
4 x USB 3.0 - Type A
1 x konsoll - RJ-45
Diverse
Tilpassede standarderFCC, ICES, IP40, VCCI Class A, RCM, LVD 2014/35/EU, IEC 62368-1 Second Edition, UL 62368-1 Third Edition, IEC 62368-1 Third Edition
Strømforsyning
StrømenhetEkstern strømadapter
Påkrevd nettspenningAC 100-240 V (50 - 60 Hz)
Strømforbruk ved drift60.5 watt
Programvare / Systemkrav
OS påkrevdApple MacOS, Linux, Microsoft Windows Server 2016, Microsoft Windows 7 / 10, Microsoft Windows Server 2019, Microsoft Windows Server 2022
Miljøparametere
Min. driftstemperatur0 °C
Maks. Driftstemperatur40 °C
Driftsfuktighet5 - 95 % (ikke-kondenserende)