FAQ
If you have questions, we have answers.
Frequently Asked Questions
What is Fortis?
+
-
Fortis is the new name for Sentinel’s Cybersecurity Services. It repositions our offerings and establishes a new approach to security that enables us to deliver an enhanced level of protection for our customers!
Is Fortis owned by Sentinel?
+
-
Yes, Fortis is a wholly owned subsidiary of Sentinel Technologies.
How was Fortis created?
+
-
Fortis combines Sentinel's internal security services (SOC, SECaaS, Managed Services) with cybersecurity awareness training, best practices consulting, assessments, hardness testing, and incident response.
How is Fortis different from other security platforms?
+
-
As the number and complexity of cyberattacks continues to escalate, your IT assets are increasingly at risk. While there are plenty of high quality products that address threats throughout the NIST Cyber Kill Chain, what's often lacking is a holistic approach aimed at delivering the most value and protection from each of these products. Fortis expends the strongest possible effort to leverage, unify, and optimize your current security infrastructure with an extensive suite of innovative services. We intend to grow our offerings and our team to provide the scale and agility customers demand in today's ever-changing threat landscape.
What are some of the primary security services offered through Fortis?
+
-
There are lot of capabilities and expertise contained under the Fortis name, including:
- Detection, containment, and remediation of viruses, worms, trojans, spyware, adware, malware, and unauthorized data/programs on electronic devices
- Network security services, namely monitoring technological functions of network systems for vulnerabilities and analyzing threats
- Monitoring of IT systems to detect unauthorized access or a data breach
- Consulting services specifically focused on cybersecurity
- Technology supervision and inspection related to cybersecurity and IT threats
- Monitoring, testing, analyzing, and reporting of security incidents, with response and remediation services
- Security threat analysis for protecting data
- Testing, analysis, and evaluation of the security policies, protocols, and technology of our customers
- Providing a website to assess and manage cyber risk and vulnerability of a network
Is there a glossary of terms related to Fortis?
+
-
Yes. Below is a brief summary:
- Fortis ActiveDefense Software (ADS) - Custom software that handles event correlation while comparing data with multiple globally respected security intelligence databases.
- Fortis Network Intrusion Detection (FNID - pronounced "find") sensor - A custom sensor that takes in events and security data.
- CloudSelect HA Platform - Sentinel infrastructure configured for high availability (HA) and housed at a Tier Three colocation facility.
- Fortis Threat Exchange (FTE) - Normalizes and enriches security alert data by providing deeper insights to maximize protection of critical assets.
- Threat Feeds - Data from organizations that evaluate and compile threat information presented in the form of a feed to cybersecurity providers.
- Adaptive Threat Response (ATR) - Proprietary correlation software specifically designed for firewalls to automatically block threats.
What is Fortis ActiveDefense?
+
-
The Fortis ActiveDefense Software (ADS) platform was developed over multiple years by Sentinel's internal software development team. It leverages our decades of cybersecurity experience and best practices. The application is powered by Splunk, the industry leader in log correlation and data visualization. Sentinel has written the Fortis ActiveDefense Software to deliver our next-generation MDR (Managed Detection and Response) and XDR (Extended Detection and Response) services. ADS is used in combination with our customized Fortis Network Intrusion Detection sensor to create the Fortis managed security experience. The resulting cyber protection dashboards, alerting, and reporting are housed in Sentinel's CloudSelect® High Availability (HA) Tier Three Data Center platform to ensure virtually 100% availability.
What are some key security features exclusive to Fortis?
+
-
- Rich Visualizations – Our dashboard visualizes the cyber risk data provided through your current technology and cybersecurity investments. This purpose-built platform supports most industry leading endpoint and edge protection software, the FNID sensor, decoy appliances, servers and hosts, as well as IT security data and alerts generated from critical infrastructure assets. The platform has been developed to provide deep insights into each element, with the ability to click to get deeper visualizations and actual log data specifics to ensure the environment is secure.
- Fortis Threat Exchange Log Enrichment – Network infrastructure provides many insights into what is occurring on your endpoints, within your network, and within cloud and SaaS environments. Sentinel enriches this data with additional contextual information through our Fortis Threat Exchange. FTE creates a conduit to log sources and APIs, then normalizes and enriches data to provide deeper insights. This helps protect your most critical assets and data from cyberattack. The Fortis Threat Exchange is Always Evolving to detect the latest threats. Additional IT infrastructure, cloud, and data sources are regularly added to the extensive list of Fortis-supported plug-ins.
- Threat Feeds – Sentinel integrates standard and custom threat feeds. Open Threat Exchange, TOR and Bad IPs are included in standard service feeds, while Hitrust, FS-ISAC and other industry-specific, subscription-based premium feeds are also available.
- Advanced “Always Refining” Correlations – Fortis ActiveDefense DevOps and analyst teams continuously evaluate the threat landscape across multiple subscribers and add to hundreds of correlations to detect anomalies. Constant fine tuning of our detection means critical alerts are triggered faster, reducing time to detect and improving time to respond to eliminate threats.
- Containment Services – Along with supported endpoint protection, analysts will follow your security policies and contain threats on your network and endpoints to stop an attack in its tracks before it has the chance to become a full breach or ransomware data hostage situation.
- Adaptive Threat Response – Unique to Fortis ActiveDefense is Sentinel’s Adaptive Threat Response (ATR). ATR provides automated threat blocking for a majority of next generation firewalls based on identification of potentially harmful behavior. When ATR detects a bad actor scanning the environment and searching for weaknesses, machine learning kicks into action, forcing a rule to block the attacker and stop the attack before it can progress along the Cyber Kill Chain. Sentinel ATR stops hundreds of thousands of bad activities daily across our base of Fortis customers.
How will Fortis impact the security services I receive today from Sentinel?
+
-
- You will continue to work with exact same team as you have in the past. Your current group/pod of analysts, management team, reporting/dashboards and any review schedule will continue unchanged, as will your sales/pre-sales and executive sponsors.
- All invoicing will continue to come from Sentinel and pricing models (both contract and hourly billing) will remain unchanged.
- Your ServiceNow portal and the process to place or review a service call will remain unchanged.
How do I schedule an assessment, review, strategic advisory engagement, or other inquiry I might have with respect to Fortis?
+
-
Contact us the same way you do today. There are no changes to our phone, electronic, or messaging platforms. If you have never worked with Sentinel before and would like additional information about Fortis, please select the "Learn More" button below and submit an inquiry.