Menu
8 top cyber-attack maps and how to use them

8 top cyber-attack maps and how to use them

Most of the cyber-attack maps online today are just eye candy, but there are some creative ways they can be used.

Fortinet

Fortinet's cyber-attack map looks similar to the one from Norse and appears to show a playback of recorded events. As the attacks are displayed, a rotating breakdown of various stats appears in the lower left part of the screen. Fortinet customers have the ability to have a map of their own, according to documentation.

fortinet cyber attack maps Fortinet

Check Point Software

The ThreatCloud cyber-attack map from Checkpoint Software shows historical data that is reset each day at 12:00 a.m. PST. The map is more visual than the one from Norse, but still has the same basic construct. In addition to watching the playback, the top attackers and targets can be viewed historically, with monthly and weekly stats.

check point software cyber attack maps Check Point Software

Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about AppleArbor NetworksCheck PointCSOFireEyeFortinetGoogleIDGKasperskyTrend MicroTwitter

Show Comments