Free Security Tools and Assessments
How These Tools Work
There are two kinds of free assessments on this page.
You click the link, sign up directly with the vendor, and get instant access to their platform or a free trial. Because these flow through our partner accounts, we are notified when you sign up and can offer help if you want it. We do not push a sales call on you.
We deploy partner hardware or software into your environment for a defined monitoring window, typically 3 to 7 days, then deliver a written report with findings and recommendations. These require coordination with your team but produce far deeper results than a self-service tool can.
Self-Service Tools
These tools require no coordination with APT to start. Sign up directly through the partner using our links and start using them today. Reports and findings are generated automatically inside the partner platform.
TrendAI Cyber Risk Exposure Management
Partner: Trend Micro (TrendAI Vision One)
Format: 30-day free trial, browser-based platform
Coverage: Full external risk visibility, attack surface, threat detection, endpoint, network, cloud, and email exposure
What it Tells You
A complete picture of your cyber risk posture across attack surface, endpoints, network, cloud, and email. The platform identifies hidden vulnerabilities, ranks them by impact, and shows where to focus first.
What You Receive
30 days of full access to the TrendAI Vision One platform with Cyber Risk Exposure Management. You see findings and risk scores in real time. APT is notified when you sign up and is available to help interpret results.
Turnaround
Immediate. Sign up today, start seeing data within hours.
Sophos Product Free Trials
Partner: Sophos
Format: Self-service free trials of individual Sophos products
Coverage: Endpoint, server, firewall, email, cloud, mobile, XDR, and ZTNA
What it Tells You
How well a specific Sophos product fits your environment. These are full product trials, not limited demos. Pick the product category you are evaluating and run the actual software in your environment.
What You Receive
Direct access to your chosen Sophos product trial. Available products include Intercept X for Endpoint, Intercept X for Server, Sophos Firewall, Sophos Email, Cloud Optix, Cloud Native Security, Sophos XDR, Sophos ZTNA, Sophos Central, Sophos Mobile, Sophos Secure Wi-Fi, and others.
Turnaround
Immediate. Trials activate at signup.
Hands-On Assessments
For these assessments, APT deploys partner hardware or software directly into your network, monitors traffic for several days, and writes a report based on what we find. These assessments produce far deeper results than self-service tools because they capture real traffic from your real environment.
Each assessment uses Fortinet's Cyber Threat Assessment Program (CTAP). Use the form below the cards to request any of these assessments.
Network Security Assessment (Fortinet CTAP NGFW)
Partner: Fortinet (FortiGate)
Format: APT deploys a FortiGate behind your existing firewall, monitors traffic, and writes a report
Coverage: Security threats bypassing your current firewall, application usage, network utilization
What it Tells You
What is getting past your existing firewall. Because the FortiGate sits behind your current firewall, anything it detects is already inside your defenses. The report covers vulnerabilities, malware, botnet activity, application usage, and bandwidth utilization.
What You Receive
A written report covering security findings, productivity insights, and bandwidth utilization. Includes specific recommendations for your environment. Sample report available on request.
Turnaround
Total engagement is roughly 2 weeks. Setup takes 1 to 2 business days, monitoring runs 5 to 7 days, and the report is delivered within 2 business days after monitoring ends.
Email Security Assessment (Fortinet CTAP Email)
Partner: Fortinet (FortiMail)
Format: APT analyzes a copy of your cloud email traffic through FortiMail
Coverage: Phishing, business email compromise, malicious attachments, spam, newsletter and ad email volume
What it Tells You
Whether your current cloud email security (Microsoft 365, Google Workspace) is missing real threats. The assessment redirects copies of inbound email to FortiMail for analysis without disrupting your normal mail flow. Useful for organizations whose only email security is the protection built into Microsoft 365 or Google Workspace.
What You Receive
A written report covering security findings (phishing attempts caught and missed, malicious attachments, BEC indicators), productivity findings (newsletter and bulk mail patterns), and recommendations.
Turnaround
Total engagement is roughly 2 weeks. Setup takes 1 to 2 business days, monitoring runs 5 to 7 days, and the report is delivered within 2 business days after monitoring ends.
SD-WAN and Branch Network Assessment (Fortinet CTAP SD-WAN)
Partner: Fortinet (FortiGate Secure SD-WAN)
Format: APT deploys a FortiGate inside your network and monitors WAN traffic
Coverage: Branch network security, WAN utilization, application performance, router gaps
What it Tells You
How your existing branch network and WAN are performing, what risks exist, and where bandwidth is being spent. Useful for organizations evaluating whether to consolidate routing and security into a single platform or transition off legacy WAN architecture.
What You Receive
A written report covering applications running across your WAN, security findings, utilization patterns, and recommendations specific to your network. Sample report available on request.
Turnaround
Total engagement is roughly 2 weeks. Setup takes 1 to 2 business days, monitoring runs 5 to 7 days, and the report is delivered within 2 business days after monitoring ends.
OT and Industrial Network Assessment (Fortinet CTAP OT)
Partner: Fortinet (FortiGate for Operational Technology)
Format: APT deploys a FortiGate into your industrial network and monitors OT traffic
Coverage: Threats targeting industrial control systems, OT application visibility, network utilization across plant or facility networks
What it Tells You
What threats are targeting your industrial control systems (ICS), SCADA networks, or other operational technology environments. Identifies application usage, network behaviors, and security gaps that traditional IT-focused assessments miss.
What You Receive
A written report covering security threats specific to OT, application usage across the industrial network, utilization patterns, and recommendations to optimize and secure the environment.
Turnaround
Total engagement is roughly 2 weeks. Setup takes 1 to 2 business days, monitoring runs 3 to 7 days, and the report is delivered within 2 business days after monitoring ends.

