ForeScout CounterACT. Automated Security Control Platform. Network Access Control Mobile Security Endpoint Compliance Threat Prevention

Similar documents
ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT Pervasive Network Security Platform Network Access Control Mobile Security Endpoint Compliance Threat Management

ForeScout ControlFabric TM Architecture

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Symantec Network Access Control Starter Edition

Choosing a Network Access Control (NAC) Solution That is Right for Your Network

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Cisco Network Admission Control (NAC) Solution

ForeScout Agentless Visibility and Control

Detecting MAC Spoofing Using ForeScout CounterACT

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Changing face of endpoint security

Deployment Guide. Best Practices for CounterACT Deployment: Guest Management

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Best Practices in Securing a Multicloud World

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

SIEM: Five Requirements that Solve the Bigger Business Issues

Reinvent Your 2013 Security Management Strategy

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

2013 InterWorks, Page 1

Total Protection for Compliance: Unified IT Policy Auditing

Securing Today s Mobile Workforce

Symantec Client Security. Integrated protection for network and remote clients.

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Enterprise Guest Access

ForeScout CounterACT. Configuration Guide. Version 1.1

The McAfee MOVE Platform and Virtual Desktop Infrastructure

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

IBM Internet Security Systems Proventia Management SiteProtector

ForeScout Extended Module for Splunk

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

White Paper. Comply to Connect with the ForeScout Platform

Forescout. Configuration Guide. Version 2.4

802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

McAfee Total Protection for Data Loss Prevention

Cisco NAC Network Module for Integrated Services Routers

McAfee epolicy Orchestrator

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

CA Security Management

Cisco ISE Plus SIEM and Threat Defense: Strengthen Security with Context

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Securing BYOD With Network Access Control, a Case Study

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Novell ZENworks Network Access Control

CA Host-Based Intrusion Prevention System r8

Automating the Top 20 CIS Critical Security Controls

Addressing PCI DSS 3.2

Industrial Defender ASM. for Automation Systems Management

Xerox and Cisco Identity Services Engine (ISE) White Paper

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

WHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

ForeScout Extended Module for VMware AirWatch MDM

McAfee Embedded Control

Five Essential Capabilities for Airtight Cloud Security

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Cisco Self Defending Network

McAfee Public Cloud Server Security Suite

TRUE SECURITY-AS-A-SERVICE

Symantec Security Monitoring Services

ForeScout Extended Module for MaaS360

Wireless and Network Security Integration Solution Overview

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

AT&T Endpoint Security

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

A Guide to Closing All Potential VDI Security Gaps

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

ForeScout Extended Module for MobileIron

SYMANTEC DATA CENTER SECURITY

Copyright 2011 Trend Micro Inc.

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Security by Default: Enabling Transformation Through Cyber Resilience

Combating Cyber Risk in the Supply Chain

THE ACCENTURE CYBER DEFENSE SOLUTION

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Don t Be the Next Data Loss Story

Understanding Network Access Control: What it means for your enterprise

Symantec Endpoint Protection 11.0

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

ForeScout Extended Module for Carbon Black

SIEM Solutions from McAfee

Unlocking the Power of the Cloud

Securing the Modern Data Center with Trend Micro Deep Security

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

Network Access Control

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

What s New in Version 3.5 Table of Contents

McAfee Skyhigh Security Cloud for Amazon Web Services

Transcription:

ForeScout CounterACT Automated Security Control Platform Network Access Control Mobile Security Endpoint Compliance Threat Prevention

Benefits Stronger security Gain 100% visibility to everything on your network Automatically find and fix endpoint security gaps Streamline secure guest access processes Protect sensitive information on your network Block zero-day attacks Enforce usage policies for applications and peripherals Banish rogue devices, applications and virtual machines Lower costs Eliminate costs associated with provisioning network access for guests and contractors Decommission dedicated lines for Internet access Eliminate time spent updating network IPS signatures and responding to false positives Reduce costs associated with endpoint compliance and remediation Automate compliance and inventory reports Greater business productivity Allow guests and contractors to appropriately use your network Allow employees to use personal handheld devices on your network Rethink IT Security Do you have an automated system to manage guests on your network? When guests or contractors come to your location, they bring their own computers. To remain productive, guests need to access the Internet, and contractors may need additional resources. Allowing unfettered access to your network introduces security risk, but keeping your network locked down impedes productivity. How do you allow guests and contractors onto your network without compromising security? Do you have a mobile security strategy? End users are in love with their smartphones and tablets. How can you securely enable connectivity and productivity? What is your security strategy? Is your mobile security strategy aligned and integrated with your PC security strategy? Without an automated security mechanism, personal mobile devices can introduce malware to your network, and they can be a source of data leakage. You ve secured your endpoint systems, right? But are there gaps? You ve already made substantial investments in endpoint security systems antivirus, antispyware, personal firewalls, patch management, etc. Is every one of your systems 100% deployed and operational? Unaware of their blind spots, agent-based systems typically overreport their own level of deployment, often by 10% to 30%. In spite of your best efforts, you probably have a gap in protection, and you re not realizing the security you paid for. You ve secured your network perimeter, right? But how about the inside? Traditional network security focuses on blocking external attacks with firewalls and intrusion prevention systems (IPS). But today, almost all serious data loss events occur from the inside. Can you keep up with zero-day attacks and address advanced persistent threats? Can rogue wireless access points and illicit applications poke holes into your network defenses without your knowledge? Are your regulatory compliance and inventory reports automated? Inventory and compliance audits are typically done periodically, using manual or semiautomated processes. This is time-consuming and costly. And the reports are only usable for historical analysis, not for operations, because the data is always old. What if you had an automated system that produced compliance and asset inventory reports in real-time? There is good news. ForeScout Technologies helps you unleash the full power and productivity of your network with enterprise-class security and control. ForeScout CounterACT is an automated security control platform that gives you stronger security, greater business productivity, and saves you time and money. The security you need. The automation you want.

Solutions to Automate Visibility and Control Network Access Control ForeScout CounterACT lets employees, guests and contractors quickly connect, comply and get to appropriate network access, while at the same time providing operations rich device and network access visibility. CounterACT offers extensive guest registration options so you can tailor the admission process to suit your organization s needs. Once registered and admitted, CounterACT can limit the user s access to just the Internet or to specified network resources. Endpoint Compliance ForeScout CounterACT automatically enforces security policies for everyone and everything on your network, which helps you minimize your security risks. Because CounterACT is agentless, it works with all type of endpoints managed and unmanaged, known and unknown, physical and virtual. CounterACT can discover security weaknesses with your existing agent-based security systems that would otherwise go undetected. When CounterACT discovers a security problem, it can automatically fix the problem, or it can leverage your existing remediation or helpdesk systems. CounterACT s extensive range of policy control and enforcement actions are shown below. Threat Prevention Mobile Security ForeScout CounterACT and ForeScout Mobile provide real-time visibility and control over smartphones, tablets and wireless devices on your network. With CounterACT, users enjoy the connectivity and productivity benefits of using their personal handheld devices while you protect your network against data loss and malicious threats. Control the level of access based on user and device type Allow, Limit, or Block. For the ultimate in mobile security, utilize ForeScout Mobile in conjunction with CounterACT and gain deep visibility into mobile device security posture, manage device configuration, and integrate with 3 rd party MDM systems. ForeScout CounterACT blocks both known and unknown attacks with 100% accuracy by continuously monitoring network devices for evidence of threatening behavior. Our patented ActiveResponse technology does not suffer from false positives so you can confidently deploy ForeScout s threat prevention system in full blocking mode. Since ActiveResponse does not require signature updates, it s maintenance free and can ensure that your network is always protected from zero-day attacks, propagating infections and malicious attacks. CounterACT provided zero-day protection against Conficker, Zeus and Stuxnet. Compliance and Audit Reports ForeScout CounterACT has real-time visibility to everything on your network. Built-in reports helps you monitor policy compliance levels, support regulatory audit requirements, and produce on-demand inventory reports. Audit processes that used to take days or weeks can now be satisfied in hours with up-to-the-minute accuracy.

The ForeScout Approach ForeScout CounterACT is an automated security control platform that delivers real-time visibility and control of all devices on your network. ForeScout CounterACT automatically identifies who and what is on your network, controls access to your network resources, measures compliance with your security policies, blocks network threats, and remediates endpoint security violations when they occur. CounterACT makes you smarter, your network more secure, and your staff less busy by automating tasks that are currently laborious. ForeScout CounterACT employs a proven approach for IT risk management, as shown in the diagram below. Every device that accesses your network is identified, controlled, remediated (if you wish), and continuously monitored to ensure compliance and protection. ForeScout has consistently demonstrated the ability to identify customer needs and develop functionality to meet their requirements often ahead of the market. Chris Rodriguez, Research Analyst. Frost & Sullivan Protect See Grant Among NAC market leaders, ForeScout is distinguished by breadth of functionality, ease of implementation and infrastructure interoperability; these traits enable ForeScout customers to do more with their NAC solutions and reap the benefits of their investment quickly relative to competing solutions. Fix Jeff Wilson, Principle Analyst Infonetics Research Policies Conditions Device type of device manufacturer location connection type User name authentication status workgroup email and phone number Operating System OS type version number patch level services and processes Security Posture antimalware agents patch management agents firewall status configuration Applications installed running version number Peripherals type of device manufacturer connection type Network Traffic malicious traffic traffic source & destination rogue DHCP or NAT behavior Actions User Communication send email send to web page open trouble ticket force re-authentication Network Access Control allow block restrict register guest OS Remediation install patch connfigure registry start or stop process trigger external remediation service Security Agent Remediation install agent start agent update agent update configuration Application Control start or stop application update application Peripherals Control disable peripheral Network Protection block malicious traffic quarantine malicious device

The ForeScout Difference ForeScout s network security solutions offer us the automated and integrated controls necessary for us to enforce access policies, including mobile security, which has become very important. Ken Corriveau, Chief Information Officer, Omnicom Media Group In looking for a network access control solution, we looked at several vendors, some of them requiring five or six appliances, and days or weeks to deploy. ForeScout was simple one box, one day to install. It met all our needs, and we had to make no changes to our network. John Shields, Senior Vice President and Chief Technology Officer, Patelco Credit Union ForeScout CounterACT is dramatically easier and faster to deploy than traditional policy enforcement products. Here is why: One box, one day to install. Everything is contained in a single appliance. Setup is easy with built-in configuration wizards. ForeScout works with what you have. All your existing switches, routers, firewalls, endpoints, patch management systems, antivirus systems, directories, ticketing systems ForeScout CounterACT works with them. No infrastructure changes are needed. No software. ForeScout CounterACT is agentless, which means it works with all types of endpoints managed and unmanaged, known and unknown, authorized and rogue. Non-disruptive. Unlike first generation NAC products that immediately disrupt users with heavy-handed access controls, ForeScout CounterACT can be deployed in a phased approach which minimizes disruption and assures success. In the initial phase, CounterACT gives you visibility to your trouble spots. When you want to move forward with automated control, you can do so gradually, choosing an appropriate enforcement action. Accelerated results. ForeScout CounterACT provides useful results on day-one by giving you real-time visibility to problems on your network. The built-in knowledge base of device classifications, rules and reports, and administration wizard help you define and configure security policies quickly and accurately. Scalability. ForeScout offers a variety of capacity, management, and support options to satisfy smaller, mid-tier networks, as well as more expansive deployments within larger, global enterprises. A single CounterACT console is capable of managing over 250,000 endpoints. Tiered mobile security solutions. ForeScout provides IT organizations the means to cost-effectively offer a tiered level of service to meet the needs of mobile users throughout your organization. Starting with network access control, you can add ForeScout Mobile and integrate with 3rd party MDM systems for a select population of high-value users. Low TCO and Proven ROI ForeScout CounterACT is used by over 1000 of the world s most secure enterprises and military installations in global deployments spanning 37 countries. Unlike other security products, CounterACT s unique security control automation system gives you an unbeatable combination of improved security, cost savings, and productivity: Function Improve Security Reduce Costs Improve Productivity Detect and control personal devices Provision guest network access Endpoint compliance and remediation Block zero-day attacks with 100% accuracy Real-time compliance and inventory reports Enforce usage policies (apps, devices, ) Quarantine rogue devices Real-time visibility

ForeScout ControlFabric ForeScout CounterACT is the foundation for the ControlFabric platform. ControlFabric is an open platform enabling ForeScout CounterACT and other solutions to exchange information and more efficiently mitigate a wide variety of security issues. Learn more at www.forescout.com/controlfabric. Take the ForeScout Challenge Let us know which ForeScout solution is right for you, and we ll arrange a free on-site evaluation. About ForeScout ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyber attacks. The company s CounterACT appliance dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based mitigation of security issues. ForeScout s open ControlFabric platform allows a broad range of IT security products and management systems to share information and automate remediation actions. Because ForeScout s solutions are easy to deploy, unobtrusive, flexible and scalable, they have been chosen by more than 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide. Learn more at: www.forescout.com. ForeScout Technologies, Inc. 900 E. Hamilton Ave., Suite 300 Campbell CA 95008 Tel: 1-866-377-8771 (US) Tel: 1-408-213-3191 (Intl.) Fax: 1-408-213-2283 www.forescout.com RnD Systems Integration Limited 31 St. Petersburgh Place, Bayswater, London W2 4LA Tel: +44 (0) 207 853 2350 Fax: +44 (0) 207 853 2320 www.rnd.co.uk 2013 ForeScout Technologies, Inc. Products protected by several US patents. All rights reserved. ForeScout Technologies, ForeScout CounterACT, ControlFabric, and the ForeScout logo are trademarks of ForeScout Technologies, Inc. CT6.3-SB1-021113 900 E. Hamilton Ave., Suite 300 Campbell, CA 95008 Tel: 1-866-377-8771 Fax: 1-408-213-2283 www.forescout.com