ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Similar documents
ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

ForeScout CounterACT. Automated Security Control Platform. Network Access Control Mobile Security Endpoint Compliance Threat Prevention

ForeScout ControlFabric TM Architecture

ForeScout Agentless Visibility and Control

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

ForeScout Extended Module for Splunk

2013 InterWorks, Page 1

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

Best Practices in Securing a Multicloud World

Deployment Guide. Best Practices for CounterACT Deployment: Guest Management

McAfee epolicy Orchestrator

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Changing face of endpoint security

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

ForeScout Extended Module for MaaS360

ForeScout Extended Module for VMware AirWatch MDM

External Supplier Control Obligations. Cyber Security

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

NEN The Education Network

Addressing PCI DSS 3.2

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Automating the Top 20 CIS Critical Security Controls

Symantec Security Monitoring Services

Securing Today s Mobile Workforce

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

8 Must Have. Features for Risk-Based Vulnerability Management and More

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

ForeScout Extended Module for Carbon Black

Cisco Network Admission Control (NAC) Solution

CA Security Management

Choosing a Network Access Control (NAC) Solution That is Right for Your Network

Cisco ISE Plus SIEM and Threat Defense: Strengthen Security with Context

Outnumbered, but not outsmarted A 2-step solution to protect IoT and mobile devices

Securing BYOD With Network Access Control, a Case Study

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

Understanding Network Access Control: What it means for your enterprise

Checklist: Credit Union Information Security and Privacy Policies

Infrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

SIEM: Five Requirements that Solve the Bigger Business Issues

ForeScout Extended Module for MobileIron

Snort: The World s Most Widely Deployed IPS Technology

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

Achieving Next-Gen NAC Results: Essential Implementation, Process and Control Considerations

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Juniper Vendor Security Requirements

Symantec Network Access Control Starter Edition

Mobile Devices prioritize User Experience

SYMANTEC DATA CENTER SECURITY

Maximizing IT Security with Configuration Management WHITE PAPER

IBM Internet Security Systems Proventia Management SiteProtector

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

Device Discovery for Vulnerability Assessment: Automating the Handoff

White Paper. Comply to Connect with the ForeScout Platform

Reinvent Your 2013 Security Management Strategy

White Paper February McAfee Policy Enforcer. Securing your endpoints for network access with McAfee Policy Enforcer.

CounterACT Afaria MDM Plugin

Managing BYOD Networks

E-guide Network Access Control (NAC) Buyer s Guide

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

NETWORK ACCESS CONTROL OVERVIEW. CONVENIENCE. SECURITY.

What It Takes to be a CISO in 2017

Cisco NAC Network Module for Integrated Services Routers

Xerox and Cisco Identity Services Engine (ISE) White Paper

CyberArk Privileged Threat Analytics

Cyber Security For Business

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Forescout. eyeextend for Carbon Black. Configuration Guide. Version 1.1

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

MaaS360 Secure Productivity Suite

Symantec Network Access Control Starter Edition

A company built on security

Information Security Controls Policy

Symantec Network Access Control Starter Edition

Networks with Cisco NAC Appliance primarily benefit from:

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Security by Default: Enabling Transformation Through Cyber Resilience

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Network Access Control Whitepaper

Security-as-a-Service: The Future of Security Management

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Integrated Access Management Solutions. Access Televentures

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Everything visible. Everything secure.

GDPR Update and ENISA guidelines

One Hospital s Cybersecurity Journey

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Aerohive and IntelliGO End-to-End Security for devices on your network

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Transcription:

Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response

Benefits Rethink IT Security Security Do you have adequate visibility of the assets and risks on your network? Gain real-time network and endpoint intelligence Continuously monitor and mitigate endpoint configuration and security gaps Block rogue devices, malicious activity, unsanctioned software, and advanced threats Increase security oversight by collapsing information silos and enhancing control context The expression you can t secure what you can t see is all the more relevant in today s complex IT environment. Most organisations are unaware of a significant percentage of the endpoints on their networks because of the proliferation of mobile, personal, transient and virtual devices. These devices are either not under management, have broken agents, or aren t detected between periodic scans. As a result, you re blind to the vulnerabilities and security gaps on these devices. How do you gain real-time insight into the endpoints, users, applications and risks on your network? Can you enforce network access based on user, device and security posture? You re faced with unprecedented diversity of users, devices and applications on your network guests, contractors, partners, and employees using their personal or corporate laptops, tablets and smartphones. Each requires access to a different set of network resources to remain productive. How do you efficiently provide appropriate network access to only authorised users, approved devices, sanctioned applications and compliant systems? Control Automation Accelerate endpoint compliance and incident response Facilitate onboarding of corporate and personal mobile devices Grant appropriate network access based on user, device, and security posture Coordinate policy-based response across disparate security tools You ve secured your corporate endpoints, right? But are there gaps? You ve made substantial investments in endpoint security and configuration management systems antimalware, data loss prevention, encryption, patch management, etc. But do you have coverage on your managed endpoints? Unfortunately, these systems are typically unaware of blind spots caused by missing, disabled or broken agents. In spite of best efforts, you probably have a gap in protection, leaving your organisation vulnerable to infection, breaches and compliance risks. How can you continuously validate and maintain endpoint security defences? Do you have an effective mobile and BYOD security strategy? Enterprise mobility and IT consumerisation are the new norm for business, but they also introduce more security and privacy issues. You must protect your network from unsanctioned, rogue and compromised mobile devices in order to prevent malware propagation, data leakage and compliance violations. You need network-based defences to fortify device, data and application-based defences provided by your MDM system. How do you mobilise your workforce and enable BYOD while maintaining security? Cost Savings Lower cost associated with endpoint remediation tasks Reduce IT overhead associated with provisioning guest access and enabling BYOD Optimise existing network and security investments through advanced interoperability Expedite audit, compliance and inventory reporting Can you respond quickly to advanced threats and security breaches? Over the years, you ve invested in a variety of security systems to thwart rising cyber threats. Many of these systems don t communicate with one another, only issue alerts, and can t take action to mitigate or contain the threat. As a result, you re overwhelmed with too many alerts. How do you coordinate security controls and automate response to rapidly contain threats and breaches? There is good news. ForeScout CounterACT enables you to efficiently address network access, endpoint compliance, mobile security and threat mitigation challenges within today s complex enterprise networks. The intelligence you need. The automation you want.

Solutions for real-time intelligence, control and automated response Real-time Visibility ForeScout CounterACT provides real-time visibility of users, devices, systems, and applications on your enterprise network. Devices are dynamically discovered, profiled and assessed wired and wireless, managed and unmanaged, virtual and embedded, laptops, and mobile. CounterACT uses a multi-faceted approach for device discovery and classification that does not require the use of software agents or prior knowledge of a device. Figure 1: ForeScout CounterACT provides real-time asset intelligence and security posture details. Network Access Control Figure 2: ForeScout CounterACT can be configured to allow appropriate network access control based on user, device, and security context. ForeScout CounterACT lets you grant network access with a fine degree of precision based on user, device, and security posture; while restricting unauthorised devices and users. Access policies can be tailored based on user, role, device type, authentication, operating system, device ownership, security posture, location, time of day, etc. CounterACT offers extensive guest registration and onboarding options so you can customise the admission process to suit your organisational needs and alleviate IT administrative overhead. Endpoint Compliance ForeScout CounterACT ensures that endpoints on your network are compliant with your security policies. CounterACT works with both managed and unmanaged devices, and helps monitor your compliance levels, supports regulatory audit requirements, and provides on-demand asset intelligence. When CounterACT discovers a security issue or policy violation, such as a missing or inactive security agent, it can automatically fix the problem, or invoke your existing patch management, remediation or helpdesk systems. Figure 3: ForeScout CounterACT monitors endpoint compliance levels and helps remediate security gaps. Secure Mobility and BYOD ForeScout CounterACT enables the secure use of corporate and personal smartphones, tablets and other mobile devices on your network. CounterACT integrates with popular MDM systems and helps automate enrolment processes to reduce helpdesk overhead and enhance end-user productivity. Integration with MDM systems also allows you to reduce mobile security risks by conducting realtime MDM posture assessment of mobile devices at network access time and while on the network. Rapid Threat Response ForeScout CounterACT integrates with leading vulnerability assessment and advanced threat detection systems to reduce your attack surface and expedite response to cyber threats. CounterACT can scan your network for indicators of compromise, determine the extent of infection, and initiate policy-based actions to quarantine or remediate compromised endpoints. This allows organisations to limit internal malware propagation and reduce security breaches.

The ForeScout Approach ForeScout CounterACT is a continuous monitoring and mitigation platform that provides real-time visibility and coordinated controls within your complex IT environment. Based on next generation network access control (NAC) technologies, CounterACT delivers: Real-time intelligence about the devices, systems, applications and users on your network A wide range of granular controls to help you enforce endpoint security policy Information sharing and automation among your existing IT security and management systems to help you rapidly fix security issues and contain breaches CounterACT allows us to see and apply policies to everything on our network. The interoperability and control capabilities are phenomenal it changes the game in terms of being proactive and responsive. Chief Information Security Officer, SIRVA Worldwide Figure 4: CounterACT with ControlFabric technology delivers real-time visibility and control over your network. ForeScout CounterACT integrates with your network, security and IT infrastructure through its ControlFabric architecture. ForeScout ControlFabric is a set of open integration technologies that enable CounterACT and other IT solutions to exchange information and efficiently mitigate a wide variety of network, security and operational issues. As a result, you can reduce the window of opportunity for cyber threats to penetrate your network, and gain higher return on investment from your existing security products. CounterACT is ideally featured to help us manage the unmanaged... we were able to control access to our production LAN...distinguishing laptops from desktops and apply different security policies to each without needlessly disrupting users or forcing agent-based authentication onto every endpoint. Network Architect and VP of Engineering, Bremer Bank ForeScout CounterACT, as a network security platform in particular, has excellent visibility, some pretty granular control and more flexible implementation capabilities for both wired and wireless network. CISO, Pioneer Investments Figure 5: ForeScout CounterACT platform interoperates with popular IT and security management systems to further enhance continuous monitoring, intelligence and mitigation capabilities.

CounterACT currently integrates with more than 60 different network, security, mobility and IT management products. Additionally, ForeScout s open ControlFabric interface allows vendors, system integrators, and customers to easily implement custom integrations based on common, standards-based protocols. ForeScout CounterACT, along with ControlFabric, provides you with continuous monitoring and mitigation capabilities, a means to enforce network and endpoint controls, and a mechanism to invoke policy-based automated response to optimise security and compliance management. The ForeScout Difference Fast and easy deployment. CounterACT is an all-in-one physical or virtual appliance that is deployed out-ofband and typically doesn t require network reconfiguration or infrastructure upgrades. Built-in wizards and customisable policy templates support a broad range of security and compliance mandates, and help you configure security policies quickly and accurately. Vendor and infrastructure agnostic. CounterACT works with a wide variety of popular switches, routers, firewalls, endpoints, patch management systems, anti-malware systems, directories, ticketing systems and more. It works in heterogeneous, multi-vendor and legacy environments without locking you into proprietary architectures that have limited third party device support. Agentless operation. CounterACT can identify, classify, authenticate and control network access of both managed and unmanaged (BYOD) endpoints without any help from agents or any kind of preconfigured endpoint software. Deep endpoint inspection can also be done without an agent as long as CounterACT has administrative credentials on the endpoint. In situations where CounterACT does not have administrative credentials (e.g. BYOD), deep inspection can be performed with the help of the optional SecureConnector agent. Non-disruptive. Unlike some security products that immediately disrupt users with heavy-handed controls, CounterACT can be deployed in a phased approach which minimises disruption and accelerates results. You can start by gaining visibility into your assets and identifying problem spots, then gradually invoke policy-based controls, starting with the highest priority issues, and progressively adding automated enforcement, remediation and mitigation actions. Scalability. CounterACT has been proven to manage over 500,000 endpoints across multiple sites. Centralised management capability allows you to see and control hundreds of thousands of connected devices, easily configure and maintain policies, and have operational oversight to identify and respond to issues within a global enterprise. Open Interoperability. CounterACT offers extensive third-party vendor interoperability through its open standards-based ControlFabric integration architecture.