Skip to content Skip to navigation Skip to footer

什麼 是 FortiRecon?

FortiRecon 是 Fortinet 的威脅暴險管理解決方案。可協助企業從被動應對轉變為主動、程式化、架構型的暴險管理與漏洞評估方法。

FortiRecon 如何協助您簡化持續暴險管理計劃

FortiRecon 透過以下方式,協助在攻擊發動前就預防攻擊:

  • 從攻擊者的視角揭露您內部與外部攻擊面的盲點,並針對威脅行為者所採用的戰術、技術與程序 (TTP) 提供詳盡的即時見解
  • 優先處理最易遭利用的漏洞,並透過攻擊性戰術進行驗證 
  • 將各種不同的解決方案整合成單一管理介面,用於有效地協調安全防護

攻擊面管理

FortiRecon 攻擊面管理模組會持續監控並呈現攻擊者視角的組織內部與外部數位攻擊面,同時對風險與暴險狀況進行優先排序。這使安全團隊能夠在威脅演變成攻擊之前主動緩解。

以對手為中心的情資 (ACI)

FortiRecon 以對手為中心的情資 (ACI) 模組提供暗網、開放原始碼及技術威脅情資的全面性涵蓋範圍。情報包括了勒索軟體情報、外洩憑證與信用卡詐欺、實際環境中遭利用的漏洞、供應鏈/供應商風險評估,以及威脅行為者見解。這有助於資安專業人員主動評估風險、更快應對事件,並提升員工的資安意識。

品牌保護

FortiRecon 品牌保護採用專有演算法,用於監控、偵測並關閉冒用真實網域的偽造網域。還能協助識別品牌與高階主管的冒充行為、多個應用程式商店中的惡意行動應用程式、程式碼儲存庫中的資料外洩、開放儲存桶暴險、網路釣魚活動,並協助保護高階主管的線上形象。

fortirecon illustration

安全協調與自動化

FortiRecon 安全協調透過以行動手冊自動化與簡化安全工作流程,協助安全團隊優先處理風險暴露並採取適當行動。

您的漏洞管理策略是否足以應對當今威脅?

在這段影片中,Fortinet 的資訊安全長 Carl Windsor 博士和產品與解決方案產品行銷資深副總裁 Nirav Shah,深入剖析為何傳統風險型漏洞管理已不足以應對當今威脅,以及企業為何需要採用 CTEM。瞭解 FortiRecon 如何協助各規模企業發掘盲點、優先處理真實風險,並自動化執行關鍵 CTEM 功能,例如紅隊演練與安全協調。

立即觀看

功能與優點

供應鏈供應商風險評估    

持續監控供應商風險,包括攻擊面暴露、勒索軟體事件及資料外洩

品牌攻擊的識別和緩解

偵測並清除對您品牌構成的威脅,例如假冒網站、行動應用程式及社群媒體帳號

持續內部與外部資產發現

發現並繪製可能遭攻擊者利用的暴露資產

安全協調

整合 SIEM 與 SOAR 系統,實現風險與威脅情報關聯分析及協調應對

移除服務

使用 FortiGuard Labs 的移除服務提供快速回應

信用卡詐騙監控

提供有關暗網市集上銷售的信用卡/簽帳金融卡資訊,包括資料外洩資訊與圖片

FortiRecon 使用案例

icon webscraping
漏洞情報與優先排序
監控並報告暗網中正在被積極利用與討論的漏洞及攻擊手法。
Malware Protection
勒索軟體情報
監控勒索軟體威脅行為者的活動,並針對相關過往及潛在目標與 TTP 提交報告。
icon orchestration
安全協調與工作流程自動化
透過內建與自訂行動手冊,自動化並簡化安全工作流程。
icon protect users and experience
可執行的威脅見解
及早獲取針對您品牌、企業資產、供應鏈供應商及軟體的風險預警。
icon incident management
攻擊面監控:MITRE ATT&CK 檢視
將偵測結果對應至 MITRE ATT&CK 架構,精準掌握攻擊者可使用或正在針對您使用的 TTP。
icon shadow it
識別網域、社群及網路釣魚威脅
偵測並移除惡意網域與行動應用程式,監控高階威脅、信用卡詐欺、程式碼儲存庫及開放儲存桶暴險。

分析師表揚

2025 年 KuppingerCole Leadership Compass for ASM
diagram analyst report kc asm fortirecon
2025 年 KuppingerCole Leadership Compass for Attack Surface Management (ASM)
Fortinet 在 2025 年 KuppingerCole Leadership Compass for Attack Surface Management (ASM) 中獲評為整體領導者。
下載報告 »

案例研究

RedotPay
RedotPay
RedotPay Integrates Fortinet's Continuous Threat Exposure Management Solution to Advance Proactive Cyber Defense
Fundación Dondé
Fundación Dondé
Mexican Non-Profit Relies on Fortinet Security Fabric to Consolidate Security Strategy for 400 Remote Locations
Shriram Capital
Shriram Capital
Shriram Capital Invests in the Fortinet Security Fabric for Resilience, Compliance, and Unification
City of Kimberley
City of Kimberley
Canadian Municipality Upgrades and Simplifies Its Cybersecurity Infrastructure with the Fortinet Security Fabric

資源

資料表
分析報告
部落格
播客
解決方案簡介
威脅報告
威脅情資
影片
網路研討會
Fireside Chat: Rethinking Cyber Risk with Continuous Threat Exposure Management (CTEM)
Fireside Chat: Rethinking Cyber Risk with Continuous Threat Exposure Management (CTEM) »

In this video, Dr, Carl Windsor, Fortinet's Chief Information Security Officer and Nirav Shah, SVP, of Products and Solutions Product Marketing, break down why traditional risk-based vulnerability management is no longer enough and why organizations need to embrace Continuous Threat Exposure Management (CTEM).

Extend Threat Intelligence Outside the Perimeter
Extend Threat Intelligence Outside the Perimeter »

FortiRecon delivers easy-to-understand, high-value threat intelligence on attacker-exposed vulnerable assets and threat actors’ activities, tools, and tactics. The service identifies brand impersonations and monitors ransomware and data breach leaks related to your organization and supply chain or third-party vendors. This enables you to take proactive steps to remediate and execute takedowns to minimize risk and exposure.

Security Automation Summit: Extend Threat Intelligence Outside the Perimeter
Security Automation Summit: Extend Threat Intelligence Outside the Perimeter »

Malicious actors are constantly launching cyberattacks, leveraging vulnerable internet-facing assets, domain infringement, phishing websites, rogue mobile apps, fake social media accounts, and more. The earlier you can view what adversaries are seeing, doing, and planning, the faster you can adjust your security posture and respond.

FortiRecon: External Threat Detection and Protection
FortiRecon: External Threat Detection and Protection »

FortiRecon provides organization-specific, expert-curated and actionable External Attack Surface (EASM) intelligence, identifies threat actors’ activity and brand infringement, and monitors ransomware data leaks, to proactively help remediate and execute takedowns or purchase the stolen data on an organization’s behalf. In this session, SVP Product Technology & Solutions, Carl Windsor, introduces FortiRecon, Fortinet’ Digital Risk Protection (DRP) service, using key case studies and real-life business scenarios.

FortiRecon Brand Protection
FortiRecon Brand Protection »

FortiRecon Brand Protection, part of FortiRecon Digital Risk Protection (DRP) service, continuously monitors the organization’s digital footprint for unauthorized changes, typosquatting, rogue applications, credential leaks, brand impersonation on social media, and web-based phishing attacks, which may impact brand value, integrity, and trust.

FortiRecon External Attack Surface Management (EASM)
FortiRecon External Attack Surface Management (EASM) »

FortiRecon External Attack Surface Management, part of FortiRecon Digital Risk Protection (DRP) service, identifies exposed known and unknown enterprise assets and associated vulnerabilities across the company, subsidiaries, and new acquisitions. It discovers servers, credentials, public cloud misconfigurations, and even third-party partner software code vulnerabilities that could be exploited.

免費產品展示

在自我引導的演示中,探索如何透過攻擊面管理、品牌保護及暗網監控來抵禦攻擊

您能期待什麼:

  • 瞭解如何識別對您的數位資產、供應鏈及品牌構成的新興威脅
  • 了解如何根據風險暴露程度來優先處理修復措施
  • 瞭解如何偵測並移除網路風險

FortiRecon 新聞