Threat Assessment

Perfect for Businesses to ascertain their Cyber Risk levels

Defensity Threat Assessment Program

Defensity’s Threat Assessment Program is a framework designed to assist you with a quick, easy and free insight into your security posture.

 

Your network is a complex set of interactions between applications, users and content at risk
from sophisticated threats, botnets and advanced malware. To manage the complexities
and block the threats requires greater visibility and performance than traditional network firewalls can
provide.

 

The Threat Assessment Program provide you with an unprecedented insight into security and threat prevention, user productivity and network utilization without compromising performance or adding latency.

What happens during a Threat Assessment?

  • Duration to run a DTAP typically takes 3-7 business days
  • Assessment report available within 2 days after receiving log files
  • Report output is in PDF format
  • We will present our insights into your network

What will my Report Contain?

 

• Performance – an entire report section dedicated to network utilization/performance.

  • Top Hosts by bandwidth
  • Hosts with highest session counts

• At risk hosts chart – We utilize client reputation to determine the trustworthiness of individual hosts.

  • Total Attacks Detected
  • Evasive Applications Detected

• Advanced persistant threat Detection

  • File Sharing Applications
  • Bandwidth Consuming Applications
  • BOTNET Infections
  • High Risk applications
  • Vulnerable Applications
  • Malware, Spyware and adware

 

  • User Productivity
  • Application Usage
  • Top Social Media Applications
  • Top Video / Audio Applications
  • Top Gaming
  • Web Usage – Top Web Categories / Web Applications / Domains

 

Call Now ButtonCALL NOW