SlideShare une entreprise Scribd logo
1  sur  34
© 2012 ForeScout Technologies, Page 1
Ed Buffone, Sr. Director WW Business Development
Automated Security Control
August 2013
© 2012 ForeScout Technologies, Page 2
About ForeScout
ForeScout is the leading global provider of pervasive network security solutions for global
2000 enterprises and government organizations.
• Independent Network Access
Control (NAC) market leader
Foundation
• 1400+ global implementations
• Financial services, government,
healthcare, manufacturing,
retail, education…
• Cupertino HQ, 195 employees
• 200+ global channel partners
Enterprise DeploymentsMarket Leadership
**NAC Competitive Landscape
April 2013, Frost&Sullivan
ForeScout
*Magic Quadrant for Network Access
Control, December 2012, Gartner Inc.
ForeScout Technologies
© 2012 ForeScout Technologies, Page 3
Top IT Management Concerns
Source: Infoworld / Forrester
http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973
© 2012 ForeScout Technologies, Page 4
Gartner Recommendations
http://www.gartner.com/technology/topics/byod.jsp
© 2012 ForeScout Technologies, Page 5
The Enterprise Challenge:
Balance Access Agility With Security
• Employees, Guests,
Contractors
• Smartphones and
personal devices
• Wireless, wired,
VPN
• Data loss
• Zero-day attacks
and malware
• Endpoint integrity
• Regulations and
compliance
Security
Access
Agility
Requires real-time,
comprehensive
visibility
Requires real-time,
automated controls
© 2012 ForeScout Technologies, Page 6
Visible Not Visible
Limited Visibility Means Security Gaps
Endpoints
Network Devices
Applications
Corporate Resources
Antivirus out of date…
Unwanted application…
Encryption/DLP agent not installed…
Protection PossibleProtection Possible No Protection PossibleNo Protection Possible
Users
Non-Corporate
?
© 2012 ForeScout Technologies, Page 7
Control Automation Advantages
ControlCosts
(OpEx,CapEx)
Control Coverage
(risk management)
W
ithout
ForeScout
With ForeScout
“The financial institution selected ForeScout
CounterACT [and] was able to save over $1,000,000
per year in endpoint support costs... The
automation achieved via ForeScout CounterACT
reduces help desk call volume, initiates fewer job
tickets for software maintenance workflows, causes
fewer image refreshes, and increases user
productivity.”
Continuous Endpoint Compliance: An Ogren Group Special Report
April 2011
© 2012 ForeScout Technologies, Page 8
ForeScout CounterACT Platform
.
Mobile
Security
Network
Access ControlEndpoint
Compliance
• Block intrusions
• Detect infected
machines
• Stop targeted
attacks
Threat
Prevention
• Real-time device
intelligence
• Find and fix
security gaps
• Enforce policies
• Register guests
• Block unauthorized
users and devices
• Limit access
• Enable BYOD
• Secure device, app
and data use
• Integrate with
Wireless and MDM
ForeScout Real-timeForeScout Real-time
Security PlatformSecurity Platform
InteroperableInteroperable
ScalableScalableAgentlessAgentless
KnowledgebaseKnowledgebase
Unique Network PresenceUnique Network Presence
ExtensibleExtensible
© 2012 ForeScout Technologies, Page 9
ForeScout CounterACT Functions
Real-time Network Asset Intelligence
• Device type, owner, location
• Security posture, applications
Email CRMWeb
Guest
User
Sales
Network Access Control
• Block, allow, limit network access
• Register guests
Automated Endpoint Enforcement
• Remediate OS, configuration, security agents
• Start/stop applications, disable peripherals
• Block worms, zero-day attacks, unwanted apps
X
© 2012 ForeScout Technologies, Page 10
ForeScout Security Policy
Engine
Switch VPN Wi-Fi
Dir,
Database
SIEM
Windows
(WSUS,
SCCM)
Mac,
Linux, iOS,
Android
MDM Antivirus
Advanced Security and Operational Integration
VA
© 2012 ForeScout Technologies, Page 11
Gartner Recommendations
“Combine NAC and mobile device management (MDM) to enforce
policies in a BYOD environment. Personally owned devices that
are not managed by MDM agents should be limited to Internet
access only, or placed in a limited access zone where they can
access a subset of applications and network resources as per
user/group role.”1
“The network security team should be part of the overall project
team that defines how BYOD will be supported. NAC should be an
integral component of the overall architecture, so that the network
has the ability to restrict access to devices that are noncompliant
with BYOD policies.”2
1
Gartner, “Securing BYOD With Network Access Control, a Case Study”, 29 August 2012, Lawrence Orans
2
Gartner, “Getting Your Network Ready for BYOD”, 28 September 2012, Lawrence Orans
© 2012 ForeScout Technologies, Page 12
MDM Integration
© 2012 ForeScout Technologies, Page 13
– Device connects to network
 Classify type
 Check for mobile agent
– If agent is missing
 Quarantine
 Install agent
– When agent is activated
 Check compliance
 Allow access
 Continue monitoring
ForeScout
CounterACT
) ) ) ) ) ) )

?

The Benefits of ForeScout-MobileIron Integration
Automated Registration
Your
Enterprise
Network
© 2012 ForeScout Technologies, Page 14
Automated MDM Enrollment
User
contacts
help desk
Without ForeScout: Manual Effort
Help desk asks
questions,
determines
device type and
ownership
Help desk
denies request
or sends user
appropriate
MDM enrollment
information
User
enrolls
device in
MDM
Device
accesses
network
With ForeScout: Automation
ForeScout discovers
and categorizes device,
authenticates user
ForeScout automates
MDM enrollment decision
and provides information
to user
User enrolls
device in MDM
Helpdesk asks
networking team
set policy
exception
allowing internet
access to get
the MDM app
Helpdesk
asks
networking
team to reset
the policy
exception
© 2012 ForeScout Technologies, Page 15
– Device connects to network
– ForeScout asks MobileIron to
provide real-time compliance
assessment
– If device is not-compliant,
CounterACT blocks device and
sends message to end-user
– End-user corrects the problem
on his mobile device
– MobileIron confirms
compliance, then ForeScout
allows the device onto the
network
The Benefits of ForeScout-MobileIron Integration
On-access Compliance Assessment
) ) ) ) ) ) )

?

ForeScout
CounterACT
Your
Enterprise
Network
© 2012 ForeScout Technologies, Page 16
MDM + NAC = complete BYOD security
Secure Mobile App Mgmt
(Distribution, Config.)
Inventory
Management
Mobile Device
Management
(App Inventory,
Remote Wipe, etc.)
Policy Compliance
(Jailbreak detection, PIN
lock, etc.)
Secure Data and
Content
Guest
Registration
Network Access Control
(Wireless, Wired, VPN)
Cert + Supplicant
Provisioning
Mobile + PC
Device-based controlDevice-based control Network-based controlNetwork-based control
Network Threat
Prevention
Visibility of
Unmanaged Devices
© 2012 ForeScout Technologies, Page 17
MDM + NAC: 1 + 1 = 3
NAC focus is
network
MDM focus is
mobile device
MDM Alone NAC Alone MDM + NAC
Visibility Full info on
managed mobile
devices only
Basic info on
managed and
unmanaged devices
Complete
Network
Access Control
None Full Complete
Compliance Mobile devices PCs, Mac, Linux Complete
Deploy Agent Pre-registration Network based Both
© 2012 ForeScout Technologies, Page 18
Unified Compliance Reports
© 2012 ForeScout Technologies, Page 19
How CounterACT Works
ForeScout
CounterACT
• Out of band
• Clientless
• One appliance
Deploy at the Core
© 2012 ForeScout Technologies, Page 20
End-To-End Security Automation
© 2012 ForeScout Technologies, Page 21
( ( ( ( ( ( (
See Grant Fix Protect
• What type of device?
• Who owns it?
• Who is logged in?
• What applications?
ForeScout
CounterACT
© 2012 ForeScout Technologies, Page 22
See Grant Fix Protect
© 2012 ForeScout Technologies, Page 23
See Grant Fix Protect
• Grant access
• Register guests
• Block access
• Restrict access
( ( ( ( ( ( (
ForeScout
CounterACT
© 2012 ForeScout Technologies, Page 24
See Grant Fix Protect
Email CRMWeb
Guest
Employee
Guest
Sales
© 2012 ForeScout Technologies, Page 25
See Grant Fix Protect
• Remediate OS
• Fix security agents
• Fix configuration
• Start/stop applications
• Disable peripheral
ForeScout
CounterACT
© 2012 ForeScout Technologies, Page 26
See Grant Fix Protect
© 2012 ForeScout Technologies, Page 27
See Grant Fix Protect
• Detect unexpected behavior
• Block insider attack
• Block worms
• Block intrusions
ForeScout
CounterACT
© 2012 ForeScout Technologies, Page 28
See Grant Fix Protect
MOVE & DISABLEMOVE & DISABLERESTRICT ACCESSRESTRICT ACCESSALERT & REMEDIATEALERT & REMEDIATE
Deploy a Virtual Firewall around an infected
or non-compliant device
Reassign the device into a VLAN with
restricted access
Update access lists (ACLs) on switches,
firewalls and routers to restrict access
Automatically move device to a pre-
configured guest network
Open trouble ticket
Send email notification
SNMP Traps
Syslog
HTTP browser hijack
Auditable end-user acknowledgement
Self-remediation
Integrate with SMS, WSUS, SCCM,
Lumension, BigFix
Reassign device from production VLAN to
quarantine VLAN
Block access with 802.1X
Alter login credentials to block access
Block access with device authentication
Turn off switch port (802.1X or SNMP)
Terminate unauthorized applications
Disable peripheral device
© 2012 ForeScout Technologies, Page 29
See Grant Fix Protect
© 2012 ForeScout Technologies, Page 30
Automated Security Benefits
Function Improve
Security
Save Time
or Money
Improve
Productivity
Detect and control personal devices
Provision guest network access
Endpoint compliance and remediation
Block zero-day attacks with 100% accuracy
Real-time compliance and inventory reports
Enforce usage policies (apps, devices, …)
Quarantine rogue devices
Real-time visibility
© 2012 ForeScout Technologies, Page 31
IT NAC Case Study
Large Bank, well over 150,000 endpoints under NAC management
Business Problem
•No real-time network intelligence: who/where/what endpoints, users
and rogue AP’s connected on corporate network?
•What percentage of endpoints and network devices are compliant
with company’s security policy?
•No centralized visibility of enterprise-wide threat activity and
compliance reporting per LOB
•No way to quickly and easily remediate non-compliant end-points and
wireless access-points – more manual and too late
•No control over corrupted, inactive or non-existent endpoint
configuration, security and compliance agents?
SIEM
•Executive dashboards with enterprise threat visibility
•Enterprise-wide event correlation
•On-demand compliance reporting per LOB
NAC
•Real-time visibility: all users / devices / apps / rogue devices
•Asset profiles, access, violations and actions send to SIEM
•Automated remediation of endpoint security and config. agents
•Works with existing infrastructure and endpoint protection products
Benefits
• Enterprise threat visibility
• Reduced business risk
• More responsive security
• Operational efficiency
• Automated remediation
• Endpoint compliance
• Demonstrable GRC gain
Benefits
• Enterprise threat visibility
• Reduced business risk
• More responsive security
• Operational efficiency
• Automated remediation
• Endpoint compliance
• Demonstrable GRC gain
What’s Next
• Expand global deployment
• Mobile security
• More remediation policies
• Add business intelligence
What’s Next
• Expand global deployment
• Mobile security
• More remediation policies
• Add business intelligence
© 2012 ForeScout Technologies, Page 32
• Easy to deploy
– Clientless
– No infrastructure changes
– Everything in a single appliance
• Rapid time to value
– Complete visibility in hours or days
• 100% coverage (no blind spots)
– Users, devices, systems, VMs, apps
• Extensive range of automated controls
– Transparent, gentle, or aggressive
• Works with every network without costly upgrades
Why Customers Choose ForeScout
© 2012 ForeScout Technologies, Page 33
Customer Testimonial
Anthony Maciel,
Director, Technology Support Services
Golden West College
“Literally, an hour after dropping a ForeScout appliance on our
network – Bang! I could see everything that was going on.”
“ForeScout CounterACT solved our
data security problems perfectly. It
gives us 100% visibility and control.”
Todd Frazier, Systems Administrator,
Culpeper County Government
“ForeScout was simple – one box, one day to install ...
and agentless operation. It met all our needs, and we
had to make no changes to our network. That’s why
we chose ForeScout – simple, cost effective, easy to
use.”
John Shields,
Sr. Vice President and CTO
Patelco Credit Union
© 2012 ForeScout Technologies, Page 34
Thank You
*This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner
report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service ]depicted in our research publications, and does not advise
technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and
should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of
merchantability or fitness for a particular purpose. Garnter, Inc. "Magic Quadrant for Network Access Control," Report G002129752, December 3, 2012, Lawrence
Orans, John Pescatore.

Contenu connexe

Tendances

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 

Tendances (20)

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Nac market
Nac marketNac market
Nac market
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 

Similaire à Automated Security Control with ForeScout CounterACT

7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Cs a multi-national oil and gas company
Cs  a multi-national oil and gas companyCs  a multi-national oil and gas company
Cs a multi-national oil and gas companyLiora R. Herman
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solutionHexnode
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Hexnode UEM Remote Device Management
 Hexnode UEM Remote Device Management Hexnode UEM Remote Device Management
Hexnode UEM Remote Device ManagementHexnode
 
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...eG Innovations
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Seclore
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 

Similaire à Automated Security Control with ForeScout CounterACT (20)

7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Cs a multi-national oil and gas company
Cs  a multi-national oil and gas companyCs  a multi-national oil and gas company
Cs a multi-national oil and gas company
 
Hexnode Windows Management solution
Hexnode Windows Management solutionHexnode Windows Management solution
Hexnode Windows Management solution
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Hexnode UEM Remote Device Management
 Hexnode UEM Remote Device Management Hexnode UEM Remote Device Management
Hexnode UEM Remote Device Management
 
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...
Citrix XenMobile and ShareFile Performance - 5 Steps for a Better BYOD Experi...
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Five Common Causes of Data Breaches
Five Common Causes of Data Breaches Five Common Causes of Data Breaches
Five Common Causes of Data Breaches
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 

Plus de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Automated Security Control with ForeScout CounterACT

  • 1. © 2012 ForeScout Technologies, Page 1 Ed Buffone, Sr. Director WW Business Development Automated Security Control August 2013
  • 2. © 2012 ForeScout Technologies, Page 2 About ForeScout ForeScout is the leading global provider of pervasive network security solutions for global 2000 enterprises and government organizations. • Independent Network Access Control (NAC) market leader Foundation • 1400+ global implementations • Financial services, government, healthcare, manufacturing, retail, education… • Cupertino HQ, 195 employees • 200+ global channel partners Enterprise DeploymentsMarket Leadership **NAC Competitive Landscape April 2013, Frost&Sullivan ForeScout *Magic Quadrant for Network Access Control, December 2012, Gartner Inc. ForeScout Technologies
  • 3. © 2012 ForeScout Technologies, Page 3 Top IT Management Concerns Source: Infoworld / Forrester http://www.infoworld.com/d/wp/the-expanding-role-of-mobility-in-the-workplace-211973
  • 4. © 2012 ForeScout Technologies, Page 4 Gartner Recommendations http://www.gartner.com/technology/topics/byod.jsp
  • 5. © 2012 ForeScout Technologies, Page 5 The Enterprise Challenge: Balance Access Agility With Security • Employees, Guests, Contractors • Smartphones and personal devices • Wireless, wired, VPN • Data loss • Zero-day attacks and malware • Endpoint integrity • Regulations and compliance Security Access Agility Requires real-time, comprehensive visibility Requires real-time, automated controls
  • 6. © 2012 ForeScout Technologies, Page 6 Visible Not Visible Limited Visibility Means Security Gaps Endpoints Network Devices Applications Corporate Resources Antivirus out of date… Unwanted application… Encryption/DLP agent not installed… Protection PossibleProtection Possible No Protection PossibleNo Protection Possible Users Non-Corporate ?
  • 7. © 2012 ForeScout Technologies, Page 7 Control Automation Advantages ControlCosts (OpEx,CapEx) Control Coverage (risk management) W ithout ForeScout With ForeScout “The financial institution selected ForeScout CounterACT [and] was able to save over $1,000,000 per year in endpoint support costs... The automation achieved via ForeScout CounterACT reduces help desk call volume, initiates fewer job tickets for software maintenance workflows, causes fewer image refreshes, and increases user productivity.” Continuous Endpoint Compliance: An Ogren Group Special Report April 2011
  • 8. © 2012 ForeScout Technologies, Page 8 ForeScout CounterACT Platform . Mobile Security Network Access ControlEndpoint Compliance • Block intrusions • Detect infected machines • Stop targeted attacks Threat Prevention • Real-time device intelligence • Find and fix security gaps • Enforce policies • Register guests • Block unauthorized users and devices • Limit access • Enable BYOD • Secure device, app and data use • Integrate with Wireless and MDM ForeScout Real-timeForeScout Real-time Security PlatformSecurity Platform InteroperableInteroperable ScalableScalableAgentlessAgentless KnowledgebaseKnowledgebase Unique Network PresenceUnique Network Presence ExtensibleExtensible
  • 9. © 2012 ForeScout Technologies, Page 9 ForeScout CounterACT Functions Real-time Network Asset Intelligence • Device type, owner, location • Security posture, applications Email CRMWeb Guest User Sales Network Access Control • Block, allow, limit network access • Register guests Automated Endpoint Enforcement • Remediate OS, configuration, security agents • Start/stop applications, disable peripherals • Block worms, zero-day attacks, unwanted apps X
  • 10. © 2012 ForeScout Technologies, Page 10 ForeScout Security Policy Engine Switch VPN Wi-Fi Dir, Database SIEM Windows (WSUS, SCCM) Mac, Linux, iOS, Android MDM Antivirus Advanced Security and Operational Integration VA
  • 11. © 2012 ForeScout Technologies, Page 11 Gartner Recommendations “Combine NAC and mobile device management (MDM) to enforce policies in a BYOD environment. Personally owned devices that are not managed by MDM agents should be limited to Internet access only, or placed in a limited access zone where they can access a subset of applications and network resources as per user/group role.”1 “The network security team should be part of the overall project team that defines how BYOD will be supported. NAC should be an integral component of the overall architecture, so that the network has the ability to restrict access to devices that are noncompliant with BYOD policies.”2 1 Gartner, “Securing BYOD With Network Access Control, a Case Study”, 29 August 2012, Lawrence Orans 2 Gartner, “Getting Your Network Ready for BYOD”, 28 September 2012, Lawrence Orans
  • 12. © 2012 ForeScout Technologies, Page 12 MDM Integration
  • 13. © 2012 ForeScout Technologies, Page 13 – Device connects to network  Classify type  Check for mobile agent – If agent is missing  Quarantine  Install agent – When agent is activated  Check compliance  Allow access  Continue monitoring ForeScout CounterACT ) ) ) ) ) ) )  ?  The Benefits of ForeScout-MobileIron Integration Automated Registration Your Enterprise Network
  • 14. © 2012 ForeScout Technologies, Page 14 Automated MDM Enrollment User contacts help desk Without ForeScout: Manual Effort Help desk asks questions, determines device type and ownership Help desk denies request or sends user appropriate MDM enrollment information User enrolls device in MDM Device accesses network With ForeScout: Automation ForeScout discovers and categorizes device, authenticates user ForeScout automates MDM enrollment decision and provides information to user User enrolls device in MDM Helpdesk asks networking team set policy exception allowing internet access to get the MDM app Helpdesk asks networking team to reset the policy exception
  • 15. © 2012 ForeScout Technologies, Page 15 – Device connects to network – ForeScout asks MobileIron to provide real-time compliance assessment – If device is not-compliant, CounterACT blocks device and sends message to end-user – End-user corrects the problem on his mobile device – MobileIron confirms compliance, then ForeScout allows the device onto the network The Benefits of ForeScout-MobileIron Integration On-access Compliance Assessment ) ) ) ) ) ) )  ?  ForeScout CounterACT Your Enterprise Network
  • 16. © 2012 ForeScout Technologies, Page 16 MDM + NAC = complete BYOD security Secure Mobile App Mgmt (Distribution, Config.) Inventory Management Mobile Device Management (App Inventory, Remote Wipe, etc.) Policy Compliance (Jailbreak detection, PIN lock, etc.) Secure Data and Content Guest Registration Network Access Control (Wireless, Wired, VPN) Cert + Supplicant Provisioning Mobile + PC Device-based controlDevice-based control Network-based controlNetwork-based control Network Threat Prevention Visibility of Unmanaged Devices
  • 17. © 2012 ForeScout Technologies, Page 17 MDM + NAC: 1 + 1 = 3 NAC focus is network MDM focus is mobile device MDM Alone NAC Alone MDM + NAC Visibility Full info on managed mobile devices only Basic info on managed and unmanaged devices Complete Network Access Control None Full Complete Compliance Mobile devices PCs, Mac, Linux Complete Deploy Agent Pre-registration Network based Both
  • 18. © 2012 ForeScout Technologies, Page 18 Unified Compliance Reports
  • 19. © 2012 ForeScout Technologies, Page 19 How CounterACT Works ForeScout CounterACT • Out of band • Clientless • One appliance Deploy at the Core
  • 20. © 2012 ForeScout Technologies, Page 20 End-To-End Security Automation
  • 21. © 2012 ForeScout Technologies, Page 21 ( ( ( ( ( ( ( See Grant Fix Protect • What type of device? • Who owns it? • Who is logged in? • What applications? ForeScout CounterACT
  • 22. © 2012 ForeScout Technologies, Page 22 See Grant Fix Protect
  • 23. © 2012 ForeScout Technologies, Page 23 See Grant Fix Protect • Grant access • Register guests • Block access • Restrict access ( ( ( ( ( ( ( ForeScout CounterACT
  • 24. © 2012 ForeScout Technologies, Page 24 See Grant Fix Protect Email CRMWeb Guest Employee Guest Sales
  • 25. © 2012 ForeScout Technologies, Page 25 See Grant Fix Protect • Remediate OS • Fix security agents • Fix configuration • Start/stop applications • Disable peripheral ForeScout CounterACT
  • 26. © 2012 ForeScout Technologies, Page 26 See Grant Fix Protect
  • 27. © 2012 ForeScout Technologies, Page 27 See Grant Fix Protect • Detect unexpected behavior • Block insider attack • Block worms • Block intrusions ForeScout CounterACT
  • 28. © 2012 ForeScout Technologies, Page 28 See Grant Fix Protect MOVE & DISABLEMOVE & DISABLERESTRICT ACCESSRESTRICT ACCESSALERT & REMEDIATEALERT & REMEDIATE Deploy a Virtual Firewall around an infected or non-compliant device Reassign the device into a VLAN with restricted access Update access lists (ACLs) on switches, firewalls and routers to restrict access Automatically move device to a pre- configured guest network Open trouble ticket Send email notification SNMP Traps Syslog HTTP browser hijack Auditable end-user acknowledgement Self-remediation Integrate with SMS, WSUS, SCCM, Lumension, BigFix Reassign device from production VLAN to quarantine VLAN Block access with 802.1X Alter login credentials to block access Block access with device authentication Turn off switch port (802.1X or SNMP) Terminate unauthorized applications Disable peripheral device
  • 29. © 2012 ForeScout Technologies, Page 29 See Grant Fix Protect
  • 30. © 2012 ForeScout Technologies, Page 30 Automated Security Benefits Function Improve Security Save Time or Money Improve Productivity Detect and control personal devices Provision guest network access Endpoint compliance and remediation Block zero-day attacks with 100% accuracy Real-time compliance and inventory reports Enforce usage policies (apps, devices, …) Quarantine rogue devices Real-time visibility
  • 31. © 2012 ForeScout Technologies, Page 31 IT NAC Case Study Large Bank, well over 150,000 endpoints under NAC management Business Problem •No real-time network intelligence: who/where/what endpoints, users and rogue AP’s connected on corporate network? •What percentage of endpoints and network devices are compliant with company’s security policy? •No centralized visibility of enterprise-wide threat activity and compliance reporting per LOB •No way to quickly and easily remediate non-compliant end-points and wireless access-points – more manual and too late •No control over corrupted, inactive or non-existent endpoint configuration, security and compliance agents? SIEM •Executive dashboards with enterprise threat visibility •Enterprise-wide event correlation •On-demand compliance reporting per LOB NAC •Real-time visibility: all users / devices / apps / rogue devices •Asset profiles, access, violations and actions send to SIEM •Automated remediation of endpoint security and config. agents •Works with existing infrastructure and endpoint protection products Benefits • Enterprise threat visibility • Reduced business risk • More responsive security • Operational efficiency • Automated remediation • Endpoint compliance • Demonstrable GRC gain Benefits • Enterprise threat visibility • Reduced business risk • More responsive security • Operational efficiency • Automated remediation • Endpoint compliance • Demonstrable GRC gain What’s Next • Expand global deployment • Mobile security • More remediation policies • Add business intelligence What’s Next • Expand global deployment • Mobile security • More remediation policies • Add business intelligence
  • 32. © 2012 ForeScout Technologies, Page 32 • Easy to deploy – Clientless – No infrastructure changes – Everything in a single appliance • Rapid time to value – Complete visibility in hours or days • 100% coverage (no blind spots) – Users, devices, systems, VMs, apps • Extensive range of automated controls – Transparent, gentle, or aggressive • Works with every network without costly upgrades Why Customers Choose ForeScout
  • 33. © 2012 ForeScout Technologies, Page 33 Customer Testimonial Anthony Maciel, Director, Technology Support Services Golden West College “Literally, an hour after dropping a ForeScout appliance on our network – Bang! I could see everything that was going on.” “ForeScout CounterACT solved our data security problems perfectly. It gives us 100% visibility and control.” Todd Frazier, Systems Administrator, Culpeper County Government “ForeScout was simple – one box, one day to install ... and agentless operation. It met all our needs, and we had to make no changes to our network. That’s why we chose ForeScout – simple, cost effective, easy to use.” John Shields, Sr. Vice President and CTO Patelco Credit Union
  • 34. © 2012 ForeScout Technologies, Page 34 Thank You *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service ]depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Garnter, Inc. "Magic Quadrant for Network Access Control," Report G002129752, December 3, 2012, Lawrence Orans, John Pescatore.

Notes de l'éditeur

  1. I’d like to spend most of my time today talking about YOUR network security and how we might be able to help make it more effective and efficient, but let me just give you one slide about who ForeScout is. In business 13 years Focused on pervasive network security Ranked a market leader by all the major analysts, such as Gartner, Forrester, and Frost and Sullivan Over 1400 customers, many of whom are large multinational organizations with over 100,000 endpoints ========================== DISCLAIMER (NOT TO BE READ) *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner, Inc. "Magic Quadrant for Network Access Control," Report G00238941 , December 3, 2012, Lawrence Orans, John Pescatore ***Frost & Sullivan chart from 2013 market study Analysis of the Network Access Control Market ”
  2. JACK cover this slide. This research was performed by the market research team at Forrester Research and published by InfoWorld. The study asked IT security managers to describe the most important security concerns. We can see that network security was the top concern, followed by data security, and device security.
  3. Gartner has published a large amount of research on BYOD, and they frequently give webinars in which they present their recommendations on what types of security products enterprises should invest in to ensure that BYOD is done securely. Most of these webcasts they give are free for you to watch.
  4. The key problem that we address – what makes us sort of unique – is our ability to help customers balance “access agility” with security. [click to advance] What I mean when I say “access agility” is the ability to have all kinds of people, and all kinds of devices such as smartphones, connecting to your network through many different types of connections. This is what is happening today, it is the road warrier experience, ant it is driving increases in productivity. [click to advance] Of course you have to be concerned about security. You lose a laptop or a smartphone that has corporate data on it, you have a data loss event. Are all the many devices like iPads running antivirus? You bet they are not, and you don’t control those devices anyway, so this is a potential threat vector. What does all this mean with respect to regulations and compliance? It is a concern, because many of these mobile devices are devices that you do not control. Yet you remain responsible for network security. [click twice to advance] To manage these risks and enable the business benefits of accessibility requires a solution that provides visibility and control which is seamless to the end user and highly automated for IT. Now …. Let me expand on the idea of comprehensive visibility. Because it is extremely important. You can’t secure what you can’t see. Let me illustrate what gaps you might have today that ForeScout could help with.
  5. Let’s start with visibility of your corporate resources. The little blue shapes on the screen represent your corporate IT assets. You have Endpoints, Network Devices, Applications, and of course users. You typically know about all these things, don’t you? Because you’ve bought them, and because the employees are on your payroll and in your directory. Now … you secure your endpoints with various security tools, right, like antivirus agents, encryption agents, data loss prevention agents, patch management systems and so forth. Right? You’ve spent lots of money on all these good systems. But the truth is that security agents are hard to maintain, and these systems don’t work correctly 100% of the time. Based on data we’ve gathered from our customers, we know that each security agent will not be working correctly on between 10% and 15% of the endpoint devices. Why? Well, the antivirus might be out of date. Or the personal firewall might be misconfigured. Or maybe the encryption agent is not properly installed. This is reality. There are various studies that support these numbers. Now … you probably have at least three desktop agents in your organization, if not four, five or even more. That’s common. [click to advance the build]   These colored “Xs” show the different endpoint agents that aren’t working properly in the real world. When you add them all up, it’s typical to find security problems on one third of your endpoints.   In fact, a few years ago, Microsoft published a report that showed over 50% of their endpoint computers had a security problem because of these types of failures. Over 50%! [click to advance the build] OK, so there are also non-corporate assets. The reality is you have non-corporate assets on your network. Employees bring in personal laptops. Contractors bring in their own systems. Not to mention all the iPhones and iPads that are brought in by visitors and by employees. Move down to the next category — network devices. Employees bring rogue network devices into the office and connect them to your network. They’re innocently trying to “help themselves” by working around your IT organization. Right? You know this happens. Think about applications. Do you have any security policies against running certain types of applications? Like instant messaging or Skype? Password reminder applications? Remote access applications? Employees want to run risky applications. Do you have visibility to this? And are you able to stop it? And of course you have non-corporate users on your network. Guests and contractors. Typically enterprises don’t have good visibility into any of these things. But they are on your network, and they can be security risks as well as operational risks.   [click to advance the build] Unless you have the technology that can show you everything touching your network, you probably only have visibility into one-half of what’s actually there. [click to advance the build] As for the rest of your network? Zero visibility. [click to advance the build] The result is you have gaps in protection because you can only protect what you know about. [click to advance the build] Luckily for you ForeScout solves this problem. ForeScout gives you complete visibility and a means to enforce security policy for EVERYTHING touching your network. This is real-time visibility and proactive control. And it’s highly automated. Now the other half of the equation is control. Visibility is great to see all the problems, but you also need controls to fix the problems. Let me say a few words about controls.
  6. It is highly advantageous to implement automated controls, and this graph shows why. If you have a manual control system, your costs go up as you increase your control coverage. This is pretty much by definition. I know that some of your systems are already automated, but some are probably not. We can talk about the details later. But my point is [click to advance the build] Everything is automated with ForeScout’s platform. So once you purchase it, and once you setup your policies, ForeScout automates your security coverage, which keeps your costs low. According to a report issued by The Ogren Group in April of 2011, one large customer has actually quantified the cost savings they have achieved with ForeScout CounterACT. The answer is over $1,000,000 per year.
  7. ForeScout provides complete visibility and control of everything on your network, and helps you enforce endpoint compliance. The functions are shown at the top of this slide, but what our customers love is how easily we do it: [click to advance the build] It’s agentless – which means there is no software that you have to install. We do provide agents for customers that want certain forms of advanced security, and this is especially important for mobile device management. But by and large, our customers are amazed at the functionality that they can obtain without an agent. It’s on the network, connected passively via a mirror port or span port, and it dynamically sees and assesses all network activity. Our platform is scalable. We have customers managing 250,000 endpoints on our system. We provide an integrated knowledgebase of the most common policies that you can configure with a simple mouse click Our platform can be integrated with a wide variety of existing IT systems, such as inventory databases, SIEM, MDM systems, etc. And our solution is completely interoperable with your existing network infrastructure and endpoint security systems. We integrate with all major brands of equipment and software. No upgrades or changes are needed to your infrastructure.
  8. What does our product do? Well, the main functions are shown here. The first function is to show you everything on your network. You get 100% visibility, and you can see who owns each device and assess its security posture. If a security agent is not functioning properly on a PC somewhere, ForeScout tells you about it. [CLICK to advance] The second function is to automatically perform some sort of action. The actions shown in this box are to control network access, based on policies that you setup. Many other actions are available, such as sending an alert to the administrator, the end-user, or a third party application. [CLICK to advance] The third function is to fix whatever security problems have been found in step 1. If a vulnerability has been discovered, ForeScout CounterACT can trigger your existing patch management system or configuration management system to fix the problem, or you can program CounterACT to directly fix the source of the problem. CounterACT can install applications, start applications, stop applications, even disable peripheral devices.
  9. Let me demonstrate three such examples. First, I’m going to describe how CounterACT integrates with MDM systems. Then I’ll describe how CounterACT integrates with databases. And finally I’ll describe how CounterACT integrates with SIEM systems.
  10. Among the published recommendations that Gartner gives their clients is this set of recommendations, which are very important to today’s webcast. Gartner recommends that organizations combine NAC and MDM to enforce policies in a BYOD environment. They say that (read slide). So let’s talk more about this and dive a little deeper into how NAC and MDM can work together.
  11. Here are examples of some of the leading MDM systems. Normally, these systems operate pretty much as islands, or silos of information. ForeScout CounterACT solves that management problem by integrating with them bi-directionally. That gives you several major security and operational benefits, as listed in the lower right corner of this slide. I will illustrate two of these in detail.
  12. When you combine ForeScout CounterACT with MobileIron, you get some synergies that improve security and save you money with operational efficiency. Let me illustrate two examples of this: One is how the onboarding process becomes more efficient, and the second example is how security posture assessment of mobile devices can become on-demand, to improve security. To start off this animation, notice that we begin with two products – MobileIron and ForeScout CounterACT So a new device tries to access your wireless access point. Immediately ForeScout CounterACT learns about it. CounterACT figures out what kind of device this is – Apple device? Android? Then ForeScout asks MobileIron if it is aware of the device. Is this a managed device? In this example, MobileIron returns an answer that it does not know about the device. [CLICK TO ADVANCE] So ForeScout quarantines the device [CLICK TO ADVANCE] And sends the user to a web page where the user can enroll his device into MobileIron. It’s all automatic. The end user does not need prior knowledge of the MDM system, and your helpdesk does not need to get involved. [CLICK TO ADVANCE] The endpoint now communicates with MobileIron. MobileIron checks whether the endpoint is compliant with your security policies. If the device is compliant, then MobileIron reports this to ForeScout CounterACT. CounterACT communicates with the switch, lifts the quarantine, and allows the device to access your enterprise network. It’s that simple.
  13. The second benefit I would like to illustrate is how ForeScout helps automate the enrollment of devices in your MDM system. When you have ForeScout on your network, it automatically discovers new devices the moment they try to connect to your network. ForeScout communicates with your existing MDM system to figure out whether a new device is supposed to be enrolled into the mDM system. If it is, then ForeScout automates that enrollment. Without ForeScout on your network, the process is much more manual. Typically the end user needs to first contact the help desk, who asks the end-user some questions, and there are several more manual steps.
  14. The first thing I want to illustrate is what we call On-access compliance assessment. Let me set the stage. You can configure MobileIron to check the compliance of mobile devices every so often, but in order to not consume too much battery life of the mobile device, many customers configure the interval to 12 hours or 24 hours. And so many of our customers are quite security conscious, and they want to know in real-time, the moment that a device tries to access the network, whether the device is compliant. The moment the mobile device enters your network, that is a critical moment , because it offers a possibility for infection to spread or data loss to occur. So here is how ForeScout and MobileIron solve this problem. [CLICK TO ADVANCE] So immediately when a mobile device connects to your network, ForeScout learns what has happened. [CLICK TO ADVANCE] ForeScout will ask MobileIron to report the compliance status. [CLICK TO ADVANCE] In this case, let’s say that MobileIron will report back that the compliance information is stale or that the device is not compliant. In this example, I’m showing that the mobile device has been jailbroken. ForeScout CounterACT blocks network access and sends the end-user a message, telling him why he has been denied access. [CLICK TO ADVANCE] Once the end-user fixes the security problem on his mobile device, he triggers MobileIron to re-assess compliance. [CLICK TO ADVANCE] If MobileIron confirms that the device is compliant, then ForeScout CounterACT will allow the device onto the network.
  15. This is one of my favorite illustrations that show you how combining MDM with NAC gives you a more complete security solution. MobileIron’s expertise is with mobile devices. ForeScout’s expertise is with the network and everything touching it. And you really need both in order to have optimal security and optimal efficiency.
  16. When you combine MDM with NAC, you gain a more complete security solution, and you also gain some valuable automation which saves time and money. There are four basic ways that ForeScout and MobileIron have integrated our products. Of course, MobileIron’s focus is on the mobile device, and ForeScout’s focus is on the network. And when you combine the two products together, you get more complete visibility as shown here. If you want to see unmanaged devices on your network, you need NAC. Period. If you want to control where users can go on your network, to protect data on your network, NAC is what you need. If you want to manage the compliance of devices on your network, you must have MDM in order to manage the compliance of mobile devices, and NAC can manage the compliance of PCs, Macs and Linux machines. So together, you have complete coverage. And last is the problem of deploying agents onto mobile devices. MDM and NAC complement each other and together provide a more efficient, more streamlined, more automated way to get mobile devices enrolled into your MDM system. So now for the next few minutes, I’m going to talk about ForeScout’s product line, and then John Briar will talk about MobileIron’s product line, and then we’re going to show you how these two products work together to deliver a really strong, highly automated solution for BYOD security.
  17. The first benefit that I want to illustrate is unified compliance reporting. ForeScout CounterACT pulls information from the MDM system, adds this information to what CounterACT already knows about the PCs on your network, and lets you produce unified compliance reports such as the sample shown here. This report encompasses iPads, Androiid devices, windows machines, MacOS systems – everything on your network. Obviously, going one place for a compliance report saves you time and money compared with the alternative of going to separate systems to produce separate reports.
  18. The name of our product is ForeScout CounterACT. CounterACT is an appliance that installs out of band at the core of your network. You can deploy it in other places, there are several other deployment scenarios which are possible, but it’s very simple to deploy at the core.   The clientless mode of operation is very popular, but you can also easily utilize ForeScout’s lightweight client if you wish.
  19. Once installed, our product lets you follow the process shown in this cycle diagram: First we give you visibility into what is on your network. We let you “ see ” everything. We tell you what is on your network, and we give you deep information about the devices including their security posture and who is logged into the devices. Then we grant network access as per your security policy. The policy that you choose to enforce is up to you. Our system is very flexible, for example if you prefer to grant access very liberally and only block access to computers that are seriously infected, that is up to you. This is also the stage where our product can limit access to just portions of your network, or maybe just grant Internet access. The fourth step is Remediation. Our product not only finds the security gaps, it fixes them. Finally, we continuously inspect the traffic from ever network device to protect your network against attacks. Our system contains zero-day protection that was effective on day zero against Conficker, Zeus, and Stuxnet. Let me show you details of how this entire cycle works. Let’s start with “see”.
  20. Our appliance tells you – in real time – what is on your network. [click to advance the build] We detect endpoints, network devices, users and applications.
  21. This is an screenshot of our system showing you mobile devices that are on your netowrk.
  22. The next step is to grant network access. One of the things that has made ForeScout successful with Network Access Control is the range of actions that we allow customers to take. They range from gentle actions such as sending alerts to the administrator, educational actions such as telling the user that they are violating a policy, or more assertive actions such as restricting network access. If you don’t want unauthorized devices or people on your network… [click] CounterACT can remove them. Automatically. Our product works with virtually ALL brands of network infrastructure. Cisco, Brocade, HP, Dell – we work seamlessly with all major brands of network infrastructure. So those unauthorized devices are now gone from your network. But you still might have some problems with the authorized endpoints themselves. That is where our second level of automated enforcement comes into play. Automated endpoint remediation.
  23. Guest networking is bread-and-butter for us. This is an example of a guest registration page that our product puts up when an unrecognized device connects to the network. The user sees this page when he opens a browser. You can customize the page to say whatever you want. (CLICK to activate the animation) Many organizations go further and use our product to control who goes where on the network. As this graphic shows, you can allow guests to access the Internet, you can allow employees to access different network resources depending on the employee’s role or group membership in your directory, and you can allow specific types of employees or contractors to access resources that are appropriate for the work that they need to do.
  24. We help you find and fix problems with your endpoints. [click] Update the operating system. [click] Disable USB memory sticks. [click] Kill applications you don’t want running. All this is from a single network appliance. And it’s all automated, saving you time and money. Our customers experience significant cost savings because of this automation.
  25. This shows you some of the remediation capabilities that are built into our platform.
  26. And there’s one more thing: CounterACT includes built-in threat prevention that has the smarts to detect when an otherwise “good” endpoint has gone bad due to some sort of infection or compromise. Our technology is extremely effective. In fact, CounterACT provided zero-day protection against Conficker, Zeus, even against the infamous Stuxnet Trojan.
  27. CounterACT includes a range of actions, ranging from gentle, to more assertive. This makes rollout of our product very successful.
  28. And the cycle repeats. We’re back to “see” and we give you reports on the compliance of everything on your network.
  29. Unlike other security products, ForeScout’s product has a direct ability to reduce costs and improve productivity.
  30. US Mil were using Cisco system RADIUS - then switched to ForeScout CounterACT. When upgraded to 7.0, they switch back to Cisco, and got 600 calls on the day they disconnect CounterACT Host not configured properly – Cisco say: not authorized, policy disconnect the host, help-desk get call from user, Desktop jeep drive to the user. Need to call the networking team to set as expectation.   US Mil. Account: Bought $1.2 M of gear.  10 appliances for SIPRnet and 10 appliances for NIPRnet HQ has 10,000 devices, and 7 remotes sites (2500 each) for each of the two networks. Purchase motivation Primary purchase motivation was difficulty deploying 802.1x.  It was taking 80% of their top network administrators time to deal with 802.1x issues.  They wanted some way to automate it.  During the POC, we set up a policy that made use of dynamic ACLs and a script  for installing the 802.1x supplicant.  If a device failed, the administrator would see it, and if he blessed it, he could hit a button and the script would push the supplicant to the endpoint. Usage: Deal with 802.1x supplicants.  Their goal is to get to compliance checking for other security features as well, like A/V. Competitive vs Cisco: At one point Cisco came in and tried to sell their NAC, but it took the network down during the pilot, whereas ours worked like a champ, even unattended while the administrator was out recovering from his motorcycle accident. Cisco had a webex open for over a week with a whole team working behind the scenes trying to get it up and they failed to get it working.  FS got it working in an afternoon!!
  31. Just before I wrap up, I want to let you know the five most important reasons why customers choose our product over other solutions. Because each of the five things that I’ve shown you our product does, you can go out and buy a product that does – or says it does – each of those five things. We interview our customers after they purchase our product, and we ask them “Why did you purchase ForeScout over another brand? Did you look at any other brands?” The answers that we get back are shown here on this slide. (Read the main bullet points only – do not digress into detail!)