Skip to content Skip to navigation Skip to footer

什么是 FortiRecon?

FortiRecon 是 Fortinet 的威胁管理解决方案。它帮助企业从被动应对转向主动、系统化且基于框架的风险管理和漏洞评估模式。 

FortiRecon如何助力优化您的持续风险管理计划

FortiRecon通过以下方式,在攻击发起前就帮助预防攻击:

  • 从攻击者的视角出发,揭示您内部和外部攻击面的盲点,并提供关于威胁攻击者所采用的战术、技术和程序(TTP)的详细实时洞察。
  • 优先处理最易被利用的漏洞,并通过攻击性战术进行验证 
  • 将分散的解决方案整合到单一管理平台中,用于有效协调安全事务

攻击面管理

FortiRecon攻击面管理模块持续监控并呈现攻击者视角下的组织内部及外部数字攻击面,同时对风险与漏洞进行优先级排序。这使安全团队能够在威胁演变为攻击之前主动加以缓解。

以攻击者为中心的情报(ACI)

FortiRecon 以攻击者为中心的情报(ACI)模块提供暗网、开源及技术威胁情报的全面覆盖。该情报涵盖勒索软件情报、泄露凭证与银行卡欺诈、野外环境中被利用的漏洞、供应链/供应商风险评估以及威胁攻击者洞察。这有助于安全专业人员主动评估安全风险、更快响应事件,并提高员工的安全意识。 

品牌保护

FortiRecon品牌保护采用专有算法,对冒充真实域名的假冒域名进行监控、检测并予以清除。它还能帮助识别品牌和高管冒充行为、多个应用商店中的恶意移动应用、代码库中的数据泄露、开放存储桶暴露、网络钓鱼活动,并协助保护高管的在线形象。

fortirecon illustration

安全编排与自动化

FortiRecon安全编排通过使用操作手册自动化并简化安全工作流程,帮助安全团队优先处理风险暴露并采取适当措施。

您的漏洞管理策略能否应对当今威胁?

在本视频中,Fortinet首席信息安全官卡尔·温莎博士与产品及解决方案营销高级副总裁尼拉夫·沙阿深入剖析了传统基于风险的漏洞管理为何已难以满足需求,以及企业为何需要采用CTEM(全面威胁与事件管理)解决方案。了解 FortiRecon 如何帮助各类规模的企业发现安全盲点、优先处理真实风险,并自动化执行关键 CTEM 功能,例如红队演练和安全编排。

马上观看

功能与优势

供应链供应商风险评估    

持续监控供应商风险,包括攻击面暴露、勒索软件事件、数据泄露

识别 & 品牌攻击缓解

监测并清除对您品牌的威胁,例如虚假网站、移动应用程序、社交媒体账户

持续内部 & 外部资产发现

发现并绘制可能被攻击者利用的暴露资产

安全编排

集成安全信息和事件管理与SOAR系统,实现风险与威胁情报关联分析及协同响应

下架服务

通过FortiGuard Labs的下线服务实现快速响应

信用卡欺诈监控

提供暗网市场中出售的信用卡/借记卡信息,包括泄露信息及图片。

FortiRecon 应用场景

icon webscraping
漏洞情报与优先级排序
监控并报告暗网中正在被积极利用和讨论的漏洞及攻击手段。
Malware Protection
勒索软件情报
监控勒索软件威胁攻击者的活动,并报告相关历史及潜在目标及其战术、技术和程序(TTP)。
icon orchestration
安全编排与工作流自动化
通过内置和自定义操作手册实现安全工作流的自动化与简化。
icon protect users and experience
可操作威胁情报
及时预警品牌、企业资产、供应链供应商及软件面临的风险。
icon incident management
攻击面监控:MITRE ATT&CK视图
将检测结果映射至MITRE ATT&CK框架,准确掌握攻击者可能使用或正在针对您使用的TTP(战术、技术和程序)。
icon shadow it
识别域名、社交和网络钓鱼威胁
检测并清除恶意域名和移动应用程序,监控高管威胁、信用卡欺诈、代码仓库泄露及开放存储桶漏洞。

分析师权威认可

2025年KuppingerCole ASM领导力指南
diagram analyst report kc asm fortirecon
2025年KuppingerCole攻击面管理(ASM)领导力指南
Fortinet在2025年KuppingerCole攻击面管理(ASM)领导力指南中被评为整体领导者。
下载报告 »

案例研究

RedotPay
RedotPay
RedotPay Integrates Fortinet's Continuous Threat Exposure Management Solution to Advance Proactive Cyber Defense
Fundación Dondé
Fundación Dondé
Mexican Non-Profit Relies on Fortinet Security Fabric to Consolidate Security Strategy for 400 Remote Locations
Shriram Capital
Shriram Capital
Shriram Capital Invests in the Fortinet Security Fabric for Resilience, Compliance, and Unification
City of Kimberley
City of Kimberley
Canadian Municipality Upgrades and Simplifies Its Cybersecurity Infrastructure with the Fortinet Security Fabric

资源

技术参数表
分析报告
博客
播客
解决方案简报
威胁报告
威胁情报
视频
网络研讨会
Fireside Chat: Rethinking Cyber Risk with Continuous Threat Exposure Management (CTEM)
Fireside Chat: Rethinking Cyber Risk with Continuous Threat Exposure Management (CTEM) »

In this video, Dr, Carl Windsor, Fortinet's Chief Information Security Officer and Nirav Shah, SVP, of Products and Solutions Product Marketing, break down why traditional risk-based vulnerability management is no longer enough and why organizations need to embrace Continuous Threat Exposure Management (CTEM).

Extend Threat Intelligence Outside the Perimeter
Extend Threat Intelligence Outside the Perimeter »

FortiRecon delivers easy-to-understand, high-value threat intelligence on attacker-exposed vulnerable assets and threat actors’ activities, tools, and tactics. The service identifies brand impersonations and monitors ransomware and data breach leaks related to your organization and supply chain or third-party vendors. This enables you to take proactive steps to remediate and execute takedowns to minimize risk and exposure.

Security Automation Summit: Extend Threat Intelligence Outside the Perimeter
Security Automation Summit: Extend Threat Intelligence Outside the Perimeter »

Malicious actors are constantly launching cyberattacks, leveraging vulnerable internet-facing assets, domain infringement, phishing websites, rogue mobile apps, fake social media accounts, and more. The earlier you can view what adversaries are seeing, doing, and planning, the faster you can adjust your security posture and respond.

FortiRecon: External Threat Detection and Protection
FortiRecon: External Threat Detection and Protection »

FortiRecon provides organization-specific, expert-curated and actionable External Attack Surface (EASM) intelligence, identifies threat actors’ activity and brand infringement, and monitors ransomware data leaks, to proactively help remediate and execute takedowns or purchase the stolen data on an organization’s behalf. In this session, SVP Product Technology & Solutions, Carl Windsor, introduces FortiRecon, Fortinet’ Digital Risk Protection (DRP) service, using key case studies and real-life business scenarios.

FortiRecon Brand Protection
FortiRecon Brand Protection »

FortiRecon Brand Protection, part of FortiRecon Digital Risk Protection (DRP) service, continuously monitors the organization’s digital footprint for unauthorized changes, typosquatting, rogue applications, credential leaks, brand impersonation on social media, and web-based phishing attacks, which may impact brand value, integrity, and trust.

FortiRecon External Attack Surface Management (EASM)
FortiRecon External Attack Surface Management (EASM) »

FortiRecon External Attack Surface Management, part of FortiRecon Digital Risk Protection (DRP) service, identifies exposed known and unknown enterprise assets and associated vulnerabilities across the company, subsidiaries, and new acquisitions. It discovers servers, credentials, public cloud misconfigurations, and even third-party partner software code vulnerabilities that could be exploited.

免费产品演示

诚邀您通过自助式演示,了解如何通过攻击面管理、品牌保护和暗网监控全方位应对网络风险和攻击

演示内容:

  • 了解如何识别您的数字资产、供应链和品牌受到的新型威胁
  • 了解如何根据暴露情况确定修复措施的优先顺序
  • 了解如何检测和降低网络风险

FortiRecon 新闻资讯