SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
1
Solution Brief
Organizational Challenges
•	Preserve the trust of citizens, other
agencies and allies’ governments by
protecting data privacy
•	Improve security posture without
impeding government services or the
free flow of information
•	Comply with North American,
European and international
regulatory mandates and directives
designed to protect sensitive
information, such as FISMA, NERC,
ISO/IEC 27001 and the GDPR5
•	Facilitate streamlined network access
and information sharing for trusted
contractors, research organizations
and the public
•	Achieve continuous monitoring and
mitigation capabilities that leverage
existing investments
Technical Challenges
•	Discover BYOD, IoT, rogue devices
and other endpoints connected to
government networks
•	Control access to confidential data
•	Prevent infected or non-compliant
devices from spreading malware
across the network
•	Enable employees and contractors
to use their personal devices while
preserving security
•	Guard against targeted threats that
can result in stolen data and network
downtime
•	Measure effectiveness of security
controls and demonstrate
compliance with regulations
Government
Government security, privacy and compliance
start at the endpoint
ForeScout Technologies, Inc. helps government
IT professionals by helping protect confidential
data, demonstrating compliance with regulations
and providing secure network access for a wide
range of devices and user populations. What’s
more, ForeScout achieves this in a cost-effective,
efficient and non-disruptive manner.
The Challenge
Here’s a small sample of data breaches that have occurred at government
agencies in 2015:
•	 Theft of Social Security numbers and other sensitive personal information from
the computer systems of the U.S. Government Office of Personnel affected
roughly 21.5 million people.1
•	 British Intelligence recently revealed that ISIS hackers intercepted top secret
British Government emails and were targeting information held by some of Prime
Minister David Cameron’s most senior advisors.2
•	 German government websites, including Chancellor Angela Merkel’s page, were
hacked in an attack claimed by a group demanding Berlin end support for the
Ukrainian government.3
It’s no wonder government agencies the world over are urgently seeking
advanced network security solutions. As cyberthreats increase in numbers and
effectiveness, government agencies must rethink how to eliminate intrusions,
protect sensitive information and mitigate exposure to cyberattacks.
As cyberthreats increase in numbers and effectiveness,
government agencies must rethink how to eliminate
intrusions, protect sensitive information and mitigate
exposure to cyberattacks.
Traditional network security products focus on blocking external attacks with
firewalls and intrusion prevention systems (IPS). However, insider threats can
do an incredible amount of damage in terms of disruptions to operations, theft
of sensitive data and loss of reputation. Misuse and abuse of data resources by
employees and contractors are rampant, as are risks associated with the wide array
of personally owned devices that are used to access networks during the workday.
At least 80 million insider attacks occur each year in the United States alone, and
that figure only includes reported attacks.4
One can only imagine the true number
and its associated costs.
2
Solution Brief
CounterACT as a Cornerstone
for Government Cybersecurity
Continuous Diagnostics and
Mitigation (CDM)
CounterACT addresses key
requirements for the U.S. Federal
Government’s CDM approach to
cybersecurity and can serve as
the centerpiece of your solution,
ensuring continuous hardware and
software visibility, monitoring and
reporting for comprehensive asset
management.
Continuous Monitoring and
Mitigation (CMM)
CounterACT capabilities go beyond
asset discovery, monitoring and
reporting to address the needs of
public sector agencies. CounterACT
also provides advanced access
control and remediation capabilities
as well as a broad range of
ControlFabric integrations with best-
in-class network, security, mobility
and IT management solutions.
Traditional endpoint security systems such as antivirus, patch management and
encryption also leave a lot to be desired because they are limited to managed,
user-based endpoints. Far too often, these security systems are not fully
operational and up-to-date on all endpoints, leaving gaps in protection and failing
to identify compromised endpoints or deter rogue wireless access points from
extending your network without your knowledge.
The ForeScout Solution
If there is one thing that is universal among all government agencies, it’s the
necessity to continuously improve security and prove compliance. Many agencies
at all levels of government use ForeScout CounterACT™ for both purposes.
CounterACT’s military-grade security protects many of the network
infrastructures of the DoD as well as those of its military contractors and
suppliers. ForeScout CounterACT is certified at the Common Criteria EAL 4+
level, the industry’s highest security certification for Network Access Control
(NAC) solutions. It is included in the DoD’s Defense Information Systems Agency
(DISA) Unified Capabilities Approved Products List (UC APL) of those that have
completed Interoperability (IO) and Information Assurance (IA) certification,
demonstrating that it meets the government’s high standards for security, ease
of use and deployment, low end-user impact and interoperability with existing
remediation solutions and infrastructure-agnostic requirements.
ForeScout has more than 100 deployments across all 15 U.S.
Federal Cabinet Departments, including all the DoD
services. ForeScout is a member of all five teams awarded
a CDM contract to date.*
In more than 60 countries*, ForeScout helps government agencies at the federal,
state and municipal levels meet the numerous access control and continuous
endpoint compliance requirements with an agentless, easy-to-deploy and
scalable solution. Government agencies use ForeScout CounterACT to protect
their critical network infrastructure and sensitive data, measure compliance with
security policies and improve operational efficiency. Here’s how:
See CounterACT offers the unique ability to see devices the instant they
connect to government networks, without requiring software agents
or prior knowledge of the device. It sees devices other products simply
can’t, such as smartphones, tablets, laptops and other agency-owned and
personal mobile devices as well as Internet of Things (IoT) devices, and
even detects stealthy sniffer devices that do not utilize an IP address.
Control Unlike systems that flag violations and send alerts to IT and
security staff, ForeScout CounterACT actually enforces network access
control, endpoint compliance, mobile device security and threat control, in
one automated system. As a result, citizens, contractors and government
employees can access networks without compromising security. In
addition, CounterACT continuously monitors devices on your network
and improves the effectiveness of your security policies so you can
demonstrate compliance with regulations.
Orchestrate CounterACT integrates with more than 70 network, security,
mobility and IT management products* via its ControlFabric™ Architecture.
This ability to orchestrate information sharing and operation among myriad
security tools allows you to:
“ “ForeScout improved the
visibility into what was
connected to the network
and helped enforce security
policies on devices.”
– Chief Information Officer,
U.S. Federal Government
Solution Brief
Copyright © 2016. All rights reserved. ForeScout Technologies, Inc. is a privately held Delaware corporation.
ForeScout, the ForeScout logo, ControlFabric, CounterACT Edge, ActiveResponse and CounterACT are trademarks
or registered trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners.
Version 1_16
ForeScout Technologies, Inc.
900 E. Hamilton Avenue #300
Campbell, CA 95008 USA
Toll-Free (US) 1-866-377-8771
Tel (Intl) +1-408-213-3191
Support 1-708-237-6591
Fax 1-408-371-2284
3
Learn more at 	
www.ForeScout.com
1 http://www.cnn.com/2015/07/09/politics/office-of-personnel-management-data-breach-20-million/
2 http://www.mirror.co.uk/news/uk-news/isis-hackers-intercept-top-secret-6428423
3 http://www.reuters.com/article/2015/01/07/us-germany-cyberattack-idUSKBN0KG15320150107
4 The Danger from Within, Harvard Business Review, September 2014
5 Regulatory legislation or standards: The Federal Information Security Management Act (FISMA), North American Electric Reliability
Corporation (NERC), International Standardization Organization/International Electrotechnical Commission (ISO/IEC) and General Data
Protection Regulation (GDPR).
* As of October 2015
•	Share context and control intelligence across systems to enforce unified
network security policies
•	Reduce vulnerability windows by automating system-wide threat
response
•	Gain higher return on investment (ROI) from your existing security
tools while saving time through workflow automation
Seeing Is Believing
ForeScout CounterACT is sold as either a virtual or physical appliance that
deploys within your existing network, typically requiring no changes to your
network configuration. The CounterACT appliance physically installs out-of-band,
avoiding latency or issues related to the potential for network failure. It can be
centrally administered to dynamically manage tens or hundreds of thousands of
endpoints from one console.

Contenu connexe

Tendances

Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemCheapSSLsecurity
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of SecurityVeracode
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
2008 Trends
2008 Trends2008 Trends
2008 TrendsTBledsoe
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsUnanet
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsEswar Publications
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 

Tendances (20)

Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Healthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend ThemHealthcare IT Security Threats & Ways to Defend Them
Healthcare IT Security Threats & Ways to Defend Them
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government Contractors
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 

En vedette

PRINCE IHIE OGBUDU CV
PRINCE IHIE OGBUDU CVPRINCE IHIE OGBUDU CV
PRINCE IHIE OGBUDU CVPRINCE OGBUDU
 
Reporte 2 arturo morales
Reporte 2 arturo moralesReporte 2 arturo morales
Reporte 2 arturo moralesBlanca Cid
 
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method Mohammad Lemar ZALMAİ
 
Embarcamos en la transparencia
Embarcamos en la transparenciaEmbarcamos en la transparencia
Embarcamos en la transparenciaIrekia - EJGV
 
مقصود حسنی کی علمی و ادبی خدمات کی فہرست اور درجہ بندی
مقصود حسنی کی علمی و ادبی خدمات  کی  فہرست اور درجہ بندیمقصود حسنی کی علمی و ادبی خدمات  کی  فہرست اور درجہ بندی
مقصود حسنی کی علمی و ادبی خدمات کی فہرست اور درجہ بندیmaqsood hasni
 
La historia situada en las aulas normalistas reporte
La historia situada en las aulas normalistas reporteLa historia situada en las aulas normalistas reporte
La historia situada en las aulas normalistas reporteVani Dav
 
Silabo lectoescritura
Silabo lectoescrituraSilabo lectoescritura
Silabo lectoescrituraEsther Amaro
 
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)nuchida suwapaet
 
40 mensajes biblicos
40 mensajes biblicos40 mensajes biblicos
40 mensajes biblicospregonero2015
 
絕對不捐懶人包
絕對不捐懶人包絕對不捐懶人包
絕對不捐懶人包莊 康信
 

En vedette (15)

Drawing slight 1
Drawing slight 1Drawing slight 1
Drawing slight 1
 
PRINCE IHIE OGBUDU CV
PRINCE IHIE OGBUDU CVPRINCE IHIE OGBUDU CV
PRINCE IHIE OGBUDU CV
 
Reporte 2 arturo morales
Reporte 2 arturo moralesReporte 2 arturo morales
Reporte 2 arturo morales
 
September Connections
September ConnectionsSeptember Connections
September Connections
 
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method
Time Cost Trade off Optimization Using Harmony Search and Monte-Carlo Method
 
Embarcamos en la transparencia
Embarcamos en la transparenciaEmbarcamos en la transparencia
Embarcamos en la transparencia
 
La anatomia
La anatomiaLa anatomia
La anatomia
 
مقصود حسنی کی علمی و ادبی خدمات کی فہرست اور درجہ بندی
مقصود حسنی کی علمی و ادبی خدمات  کی  فہرست اور درجہ بندیمقصود حسنی کی علمی و ادبی خدمات  کی  فہرست اور درجہ بندی
مقصود حسنی کی علمی و ادبی خدمات کی فہرست اور درجہ بندی
 
La historia situada en las aulas normalistas reporte
La historia situada en las aulas normalistas reporteLa historia situada en las aulas normalistas reporte
La historia situada en las aulas normalistas reporte
 
Informe historia
Informe historiaInforme historia
Informe historia
 
Silabo lectoescritura
Silabo lectoescrituraSilabo lectoescritura
Silabo lectoescritura
 
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)
บทที่ 9 โรงไฟฟ้าพลังงานนิวเคลียร์ (2/57)
 
40 mensajes biblicos
40 mensajes biblicos40 mensajes biblicos
40 mensajes biblicos
 
MRI
MRIMRI
MRI
 
絕對不捐懶人包
絕對不捐懶人包絕對不捐懶人包
絕對不捐懶人包
 

Similaire à Government-ForeScout-Solution-Brief

AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecuritySonaliG6
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 

Similaire à Government-ForeScout-Solution-Brief (20)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
Information Security
Information SecurityInformation Security
Information Security
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

Government-ForeScout-Solution-Brief

  • 1. 1 Solution Brief Organizational Challenges • Preserve the trust of citizens, other agencies and allies’ governments by protecting data privacy • Improve security posture without impeding government services or the free flow of information • Comply with North American, European and international regulatory mandates and directives designed to protect sensitive information, such as FISMA, NERC, ISO/IEC 27001 and the GDPR5 • Facilitate streamlined network access and information sharing for trusted contractors, research organizations and the public • Achieve continuous monitoring and mitigation capabilities that leverage existing investments Technical Challenges • Discover BYOD, IoT, rogue devices and other endpoints connected to government networks • Control access to confidential data • Prevent infected or non-compliant devices from spreading malware across the network • Enable employees and contractors to use their personal devices while preserving security • Guard against targeted threats that can result in stolen data and network downtime • Measure effectiveness of security controls and demonstrate compliance with regulations Government Government security, privacy and compliance start at the endpoint ForeScout Technologies, Inc. helps government IT professionals by helping protect confidential data, demonstrating compliance with regulations and providing secure network access for a wide range of devices and user populations. What’s more, ForeScout achieves this in a cost-effective, efficient and non-disruptive manner. The Challenge Here’s a small sample of data breaches that have occurred at government agencies in 2015: • Theft of Social Security numbers and other sensitive personal information from the computer systems of the U.S. Government Office of Personnel affected roughly 21.5 million people.1 • British Intelligence recently revealed that ISIS hackers intercepted top secret British Government emails and were targeting information held by some of Prime Minister David Cameron’s most senior advisors.2 • German government websites, including Chancellor Angela Merkel’s page, were hacked in an attack claimed by a group demanding Berlin end support for the Ukrainian government.3 It’s no wonder government agencies the world over are urgently seeking advanced network security solutions. As cyberthreats increase in numbers and effectiveness, government agencies must rethink how to eliminate intrusions, protect sensitive information and mitigate exposure to cyberattacks. As cyberthreats increase in numbers and effectiveness, government agencies must rethink how to eliminate intrusions, protect sensitive information and mitigate exposure to cyberattacks. Traditional network security products focus on blocking external attacks with firewalls and intrusion prevention systems (IPS). However, insider threats can do an incredible amount of damage in terms of disruptions to operations, theft of sensitive data and loss of reputation. Misuse and abuse of data resources by employees and contractors are rampant, as are risks associated with the wide array of personally owned devices that are used to access networks during the workday. At least 80 million insider attacks occur each year in the United States alone, and that figure only includes reported attacks.4 One can only imagine the true number and its associated costs.
  • 2. 2 Solution Brief CounterACT as a Cornerstone for Government Cybersecurity Continuous Diagnostics and Mitigation (CDM) CounterACT addresses key requirements for the U.S. Federal Government’s CDM approach to cybersecurity and can serve as the centerpiece of your solution, ensuring continuous hardware and software visibility, monitoring and reporting for comprehensive asset management. Continuous Monitoring and Mitigation (CMM) CounterACT capabilities go beyond asset discovery, monitoring and reporting to address the needs of public sector agencies. CounterACT also provides advanced access control and remediation capabilities as well as a broad range of ControlFabric integrations with best- in-class network, security, mobility and IT management solutions. Traditional endpoint security systems such as antivirus, patch management and encryption also leave a lot to be desired because they are limited to managed, user-based endpoints. Far too often, these security systems are not fully operational and up-to-date on all endpoints, leaving gaps in protection and failing to identify compromised endpoints or deter rogue wireless access points from extending your network without your knowledge. The ForeScout Solution If there is one thing that is universal among all government agencies, it’s the necessity to continuously improve security and prove compliance. Many agencies at all levels of government use ForeScout CounterACT™ for both purposes. CounterACT’s military-grade security protects many of the network infrastructures of the DoD as well as those of its military contractors and suppliers. ForeScout CounterACT is certified at the Common Criteria EAL 4+ level, the industry’s highest security certification for Network Access Control (NAC) solutions. It is included in the DoD’s Defense Information Systems Agency (DISA) Unified Capabilities Approved Products List (UC APL) of those that have completed Interoperability (IO) and Information Assurance (IA) certification, demonstrating that it meets the government’s high standards for security, ease of use and deployment, low end-user impact and interoperability with existing remediation solutions and infrastructure-agnostic requirements. ForeScout has more than 100 deployments across all 15 U.S. Federal Cabinet Departments, including all the DoD services. ForeScout is a member of all five teams awarded a CDM contract to date.* In more than 60 countries*, ForeScout helps government agencies at the federal, state and municipal levels meet the numerous access control and continuous endpoint compliance requirements with an agentless, easy-to-deploy and scalable solution. Government agencies use ForeScout CounterACT to protect their critical network infrastructure and sensitive data, measure compliance with security policies and improve operational efficiency. Here’s how: See CounterACT offers the unique ability to see devices the instant they connect to government networks, without requiring software agents or prior knowledge of the device. It sees devices other products simply can’t, such as smartphones, tablets, laptops and other agency-owned and personal mobile devices as well as Internet of Things (IoT) devices, and even detects stealthy sniffer devices that do not utilize an IP address. Control Unlike systems that flag violations and send alerts to IT and security staff, ForeScout CounterACT actually enforces network access control, endpoint compliance, mobile device security and threat control, in one automated system. As a result, citizens, contractors and government employees can access networks without compromising security. In addition, CounterACT continuously monitors devices on your network and improves the effectiveness of your security policies so you can demonstrate compliance with regulations. Orchestrate CounterACT integrates with more than 70 network, security, mobility and IT management products* via its ControlFabric™ Architecture. This ability to orchestrate information sharing and operation among myriad security tools allows you to: “ “ForeScout improved the visibility into what was connected to the network and helped enforce security policies on devices.” – Chief Information Officer, U.S. Federal Government
  • 3. Solution Brief Copyright © 2016. All rights reserved. ForeScout Technologies, Inc. is a privately held Delaware corporation. ForeScout, the ForeScout logo, ControlFabric, CounterACT Edge, ActiveResponse and CounterACT are trademarks or registered trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners. Version 1_16 ForeScout Technologies, Inc. 900 E. Hamilton Avenue #300 Campbell, CA 95008 USA Toll-Free (US) 1-866-377-8771 Tel (Intl) +1-408-213-3191 Support 1-708-237-6591 Fax 1-408-371-2284 3 Learn more at www.ForeScout.com 1 http://www.cnn.com/2015/07/09/politics/office-of-personnel-management-data-breach-20-million/ 2 http://www.mirror.co.uk/news/uk-news/isis-hackers-intercept-top-secret-6428423 3 http://www.reuters.com/article/2015/01/07/us-germany-cyberattack-idUSKBN0KG15320150107 4 The Danger from Within, Harvard Business Review, September 2014 5 Regulatory legislation or standards: The Federal Information Security Management Act (FISMA), North American Electric Reliability Corporation (NERC), International Standardization Organization/International Electrotechnical Commission (ISO/IEC) and General Data Protection Regulation (GDPR). * As of October 2015 • Share context and control intelligence across systems to enforce unified network security policies • Reduce vulnerability windows by automating system-wide threat response • Gain higher return on investment (ROI) from your existing security tools while saving time through workflow automation Seeing Is Believing ForeScout CounterACT is sold as either a virtual or physical appliance that deploys within your existing network, typically requiring no changes to your network configuration. The CounterACT appliance physically installs out-of-band, avoiding latency or issues related to the potential for network failure. It can be centrally administered to dynamically manage tens or hundreds of thousands of endpoints from one console.