The Threat Map displays network activity by geographic region. A visual lists of threats is shown at the bottom, displaying the location, severity, and nature of the attacks. The color gradient of the darts on the map indicate the traffic risk, where red indicates the more critical risk.
Is your network security keeping up with the latest threats?
Request a free threat assessment today and find out about your vulnerabilities, user productivity, and network performance.
A Fortinet Cyber Threat Assessment can help you better understand:
- Security Risk – which application vulnerabilities are being used to attack your network, which malware/botnets were detected, what phishing attacks are making it through your defences and which devices are “at risk”— for security breach probability.
- Productivity – which peer-to-peer, social media, instant messaging, and other apps are running—for application visibility control as well as what spam, newsletters or adult content may be bothering your email.
- Utilisation and Performance – what is your throughput, session, and bandwidth usage requirements during peak hours—for the network, email system and critical applications.