Seg - Sex 07:00-20:00
Seg - Sex 07:00-20:00

FortiSandbox VM00 Revenda Fortinet

Multi-Layer Proactive Threat Mitigation
Overview
ATP Framework
Features
Deployment
Specifications
Documentation

Today’s most sophisticated cybercriminals are increasingly bypassing traditional antimalware solutions and inserting advanced persistent threats deep within networks. These highly targeted attacks evade established signature-based detection by masking their malicious nature in many ways — compression, encryption, polymorphism, the list of techniques goes on.

Some have even begun to evade virtual “sandbox” environments using VM detection, “time bombs” and more. Fighting today’s attacks requires a comprehensive and integrated approach — more than antimalware. More than a virtual sandbox. More than a separate monitoring system.

FortiSandbox offers a robust combination of proactive detection and mitigation, actionable threat insight and integrated and automated deployment. At its foundation is a unique, duallevel sandbox which is complemented by Fortinet’s award-winning antimalware and optional integrated FortiGuard threat intelligence. Years of Fortinet threat expertise is now packaged up and available on site or in the cloud via FortiSandbox.

Proactive Detection and Mitigation

Suspicious codes are subjected to multi-layer pre-filters prior to execution in the virtual OS for detailed behavioral analysis. The highly effective pre-filters include a screen by our AV engine, queries to cloud-based threat databases and OS-independent simulation with a code emulator, followed by execution in the full virtual runtime environment. Once a malicious code is detected, granular ratings along with key threat intelligence is available, a signature is dynamically created for distribution to integrated products and full threat information is optionally shared with FortiGuard Labs for the update of global threat databases.

Actionable Insight

All classifications — malicious and high/medium/low risk — are presented within an intuitive dashboard. Full threat information from the virtual execution — including system activity, exploit efforts, web traffic, subsequent downloads, communication attempts and more — is available in rich logs and reports.

The ultimate combination of proactive mitigation, advanced threat visibility and comprehensive reporting.

  • Secure virtual runtime environment exposes unknown threats
  • Unique multi-layer prefilters aid fast and effective threat detection
  • Rich reporting provides full threat lifecycle visibility
  • Inspection of many protocols in one appliance simplifies deployment and reduces cost
  • Integration and automation with Fortinet threat prevention products enhances rather than duplicates security infrastructure
  • Independent testing and certification validates effectiveness

Advanced Threat Protection Framework:

The most effective defense against advanced targeted attacks is founded on a cohesive and extensible protection framework. The Fortinet framework uses security intelligence across an integrated solution of traditional and advanced security tools for network, application and endpoint security, and threat detection to deliver actionable, continuously improving protection.

Fortinet integrates the intelligence of FortiGuard Labs into FortiGate next generation firewalls, FortiMail secure email gateways, FortClient endpoint security, FortiSandbox advanced threat detection, and other security products to continually optimize and improve the level of security delivered to organizations with a Fortinet solution.

Prevent Attacks

Fortinet next generation firewalls, secure email gateways, web application firewalls, endpoint security and similar solutions use security such as antivirus, web filtering, IPS, and other traditional security techniques to quickly and efficiently prevent known threats from impacting an organization.

Detect and Analyze Threats

FortiSandbox and other advanced detection techniques step in to detect “Zero-day” threats and sophisticated attacks, delivering risk ratings and attack details necessary for remediation.

Mitigate Impact and Improve Protection

In a Fortinet solution, detection findings can be used to trigger prevention actions to ensure the safety of resources and data until remediation is in place. Finally, the entire security ecosystem updates to mitigate any impact from future attacks through the strong, integrated threat intelligence research and services of FortiGuard Labs.

Sandbox Malware Analysis

Complement your established defenses with a two-step sandboxing approach. Suspicious and at-risk files are subjected to the first stage of analysis with Fortinet’s awardwinning AV engine, FortiGuard global intelligence query*, and code emulation. Second stage analysis is done in a contained environment to uncover the full attack lifecycle using system activity and callback detection. Figure 1 depicts new threats discovered in real time.

In addition to supporting FortiGate, FortiMail, FortiWeb, FortiADC, FortiProxy, FortiClient (ATP agent) and Fabric-Ready Partner submission, third-party security vendor offerings are supported through a well-defined open API set.

Reporting and Investigative Tools

Reports with captured packets, original file, tracer log, and screenshot provide rich threat intelligence and actionable insight after files are examined. This is to speed up remediation.

Threat Mitigation

Fortinet’s ability to uniquely integrate various products with FortiSandbox through the Security Fabric offers automatic protection with incredibly simple setup. Once a malicious code is identified, the FortiSandbox will return risk ratings and the local intelligence is shared in real time with Fortinet and third-party vendor-registered devices and clients to remediate and immunize against new advanced threats. The local intelligence can optionally be shared with Fortinet threat research team, FortiGuard Labs, to help protect organizations globally. Figure 3 steps through the flow on the automated mitigation process.

Features Summary

Administration

  • Supports WebUI and CLI configurations
  • Multiple administrator account creation
  • Configuration file backup and restore
  • Notification email when malicious file is detected
  • Weekly report to global email list and FortiGate administrators
  • Centralized search page which allows administrators to build customized search conditions
  • Frequent signature auto-updates
  • Automatic check and download new VM images
  • VM status monitoring
  • Radius Authentication for administrators

Networking/Deployment

  • Static Routing Support
  • File Input: Offline/sniffer mode, On-demand file upload, file submission from integrated device(s)
  • Option to create simulated network for scanned file to access in a closed network environment
  • High-Availability Clustering support
  • Port monitoring for fail-over in a cluster

Systems Integration

  • File Submission input: FortiGate, FortiMail, FortiWeb, FortiADC, FortiProxy and FortiClient (ATP agent)
  • File Status Feedback and Report: FortiGate, FortiMail, FortiWeb, FortiADC, FortiProxy and FortiClient (ATP agent)
  • Dynamic Threat DB update: FortiGate, FortiMail, FortiWeb, FortiADC, FortiProxy and FortiClient (ATP agent)
    • Periodically push dynamic DB to registered entities.
    • File checksum and malicious URL DB
  • Update Database proxy: FortiManager
  • Remote Logging: FortiAnalyzer, syslog server
  • JSON API to automate the process of uploading samples and downloading actionable malware indicators to remediate
  • Certified third-party integration: CarbonBlack, Ziften
  • Inter-sharing of IOCs between FortiSandboxes

Advanced Threat Protection

  • Inspection of new threats including ransomware and password protected malware mitigation
  • Static Code analysis identifying possible threats within non-running code
  • Heuristic/Pattern/Reputation-based analysis
  • Virtual OS Sandbox:
    • Concurrent instances
    • OS type supported: Windows XP*, Windows 7, Windows 8.1, Windows 10, macOS, and Android
    • Anti-evasion techniques: sleep calls, process and registry queries
    • Callback Detection: malicious URL visit, Botnet C&C communication and attacker traffic from activated malware
    • Download Capture packets, Original File, Tracer log and Screenshot
    • Sandbox Interactive Mode
  • File type support: .7z, .ace, .apk, .app, .arj, .bat, .bz2, .cab, .cmd, .dll, .dmg, .doc, .docm, .docx, .dot, .dotm, .dotx, .exe, .gz, .htm, html, .jar, .js, .kgb, .lnk, .lzh, Mach-O, .msi, .pdf, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .ps1, .rar, .rtf, .sldm, .sldx, .swf, .tar, .tgz, .upx, url, .vbs, WEBLink, .wsf, .xlam, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xz, .z, .zip
  • Protocols/applications supported:
    • Sniffer mode: HTTP, FTP, POP3, IMAP, SMTP, SMB
    • Integrated mode with FortiGate: HTTP, SMTP, POP3, IMAP, MAPI, FTP, IM and their equivalent SSL encrypted versions
    • Integrated mode with FortiMail: SMTP, POP3, IMAP
    • Integrated mode with FortiWeb: HTTP
    • Integrated mode with ICAP Client: HTTP
  • Customize VMs with support file types
  • Isolate VM image traffic from system traffic
  • Network threat detection in Sniffer Mode: Identify Botnet activities and network attacks, malicious URL visit
  • Scan SMB/NFS network share and quarantine suspicious files. Scan can be scheduled
  • Scan embedded URLs inside document files
  • Integrate option for third partyYara rules
  • Option to auto-submit suspicious files to cloud service for manual analysis and signature creation
  • Option to forward files to a network share for further third-party scanning
  • Files checksum whitelist and blacklist option
  • URLs submission for scan and query from emails and files

Monitoring and Report

  • Real-Time Monitoring Widgets (viewable by source and time period options): Scanning result statistics, scanning activities (over time), top targeted hosts, top malware, top infectious urls, top callback domains
  • Drilldown Event Viewer: Dynamic table with content of actions, malware name, rating, type, source, destination, detection time and download path
  • Logging — GUI, download RAW log file
  • Report generation for malicious files: Detailed reports on file characteristics and behaviors – file modification, process behaviors, registry behaviors, network behaviors, vm snapshot, behavior chronology chart
  • Further Analysis: Downloadable files — sample file, sandbox tracer logs, PCAP capture and indicators in STIX format

* a real time IoC check for emerging threats (known good and bad) within the FortiGuard intelligence community

Easy Deployment

FortiSandbox supports inspection of many protocols in one unified solution, thus simplifies network infrastructure and operations. Further, it integrates within the Security Fabric adding a layer of advanced threat protection to your existing security architecture.

The FortiSandbox is the most flexible threat analysis appliance in the market as it offers various deployment options for customers’ unique configurations and requirements. Organizations can choose to combine these deployment options.

Standalone

This FortiSandbox deployment mode accepts inputs as an ICAP server or from spanned switch ports or network taps. It may also include administrators’ on-demand file uploads or scanning of file respositories via CIFs or NFS through the GUI. It is the ideal option to enhancing an existing multi-vendor threat protection approach.

Integrated

Fortinet products, such as FortiGate, FortiMail, FortiWeb, FortiADC, FortiProxy and FortiClient (ATP agent) and third-party security vendors can intercept and submit suspicious content to FortiSandbox when they are configured to interact with FortiSandbox. The integration will also provide timely remediation and reporting capabilities to those devices.

This integration extends to other FortiSandboxes to allow instantaneous sharing of real-time intelligence. This benefits large enterprises that deploy multiple FortiSandboxes in different geo-locations. This zero-touch automated model is ideal for holistic Figure 4: Standalone Deployment protection across different borders and time zones.

FortiSandbox VM
Hardware Requirementy
Hypervisor Support VMware ESXi version 5.1 or later, Citrix XenServer 6.2 or later, Linux KVM CentOS 7.2 or later
Virtual CPUs (Minimum / Maximum) 4 / Unlimited
(Fortinet recommends that the number of vCPUs match the number of Windows VM +4.)
Memory Support (Minimum / Maximum) 8 GB / Unlimited
Virtual Storage (Minimum / Maximum) 30 GB / 16 TB
Total Virtual Network Interfaces (Minimum) 6
System
VM Sandboxing (Files/Hour) Hardware Dependent
AV Scanning (Files/Hour) Hardware Dependent
Number of VMs 4 to 54 (Upgrade via appropriate licenses)

 

    FortiGate FortiClient FortiMail FortiWeb
FSA Appliance and VM File Submission *FortiOS V5.0.4+ FortiClient for Windows OS V5.4+ FortiMail OS V5.1+ FortiWeb OS V5.4+
File Status Feedback *FortiOS V5.0.4+ FortiClient for Windows OS V5.4+ FortiMail OS V5.1+ FortiWeb OS V5.4+
File Detailed Report *FortiOS V5.4+ FortiClient for Windows OS V5.4+ FortiMail OS V5.1+
Dynamic Threat DB Update *FortiOS V5.4+ FortiClient for Windows OS V5.4+ FortiMail OS V5.3+ FortiWeb OS V5.4+
FortiSandbox Cloud File Submission *FortiOS V5.2.3+ FortiMail OS V5.3+ FortiWeb OS 5.5.3+
File Status Feedback *FortiOS V5.2.3+ FortiMail OS V5.3+ FortiWeb OS 5.5.3+
File Detailed Report *FortiOS V5.2.3+
Dynamic Threat DB Update *FortiOS V5.4+ FortiMail OS V5.3+ FortiWeb OS 5.5.3+

*some models may require CLI configuration

Clique aqui e responda nosso questionário!

Entre em contato e solicite um orçamento agora!

Precisa comprar, renovar licença, instalar ou migrar seu equipamento ?
Planejamos sua aquisição, instalação, implantação ou migração, para mais informações faça contato com a TND Brasil através do telefone (11) 3717-5537 , e-mail [email protected] ou envie uma mensagem.

    Ex: João

    Ex: Fabrikam Corp.

    Ex: 005800410000130

    Ex: (11) 3717-5537

    Ex: Gostaria de alugar um servidor

    Descreva o melhor possível sua duvida ou necessidade