SlideShare a Scribd company logo
1 of 57
Download to read offline
Phatchara Maichandi
Presales Engineer
Throughwave (Thailand) Co., Ltd.
© 2014 ForeScoutTechnologies, Page 2
• Enterprise Security Trend
• ForeScout Capabilities
• ForeScout Integration
• BYOD Security
• Case Studies
• Conclusion
© 2014 ForeScoutTechnologies, Page 3
© 2014 ForeScoutTechnologies, Page 4
Corporate Resources
Antivirusout ofdate
Unauthorizedapplication
Agents not installedor
not running
Endpoints
VM
VM
VM
VM
VM
VM
VM
VM
VM
VM
VM
Non-corporate
VM
Users
Applications
Network
Devices
© 2014 ForeScoutTechnologies, Page 5
© 2014 ForeScoutTechnologies, Page 6
© 2014 ForeScoutTechnologies, Page 7
© 2014 ForeScoutTechnologies, Page 8
• Complex architecture
• Requires reconfiguration and upgrade of existing switches
• Requires installation of endpoint agents
• Requires 802.1X
• Long drawn-out implementations
• Brittle, prone to disruption and breakage
Outdated NAC
© 2014 ForeScoutTechnologies, Page 9
Fast and easy deployment
– No infrastructure changes
or network upgrades
– No need for endpoint agents
– 802.1X is optional
– Integrated appliance
(physical or virtual)
Streamline and automate
existing IT processes
– Guest registration
– MDM enrollment
– BYOD onboarding
– Asset intelligence
Shift away from restrictive
allow-or-deny policies
– Flexible controls, based on
user and device context
– Preserve user experience
Integrate with other IT systems
– Break down information silos
– Reduce window of vulnerability
by automating controls & actions
© 2014 ForeScoutTechnologies, Page 10
© 2014 ForeScoutTechnologies, Page 11
Strong Foundation Market Leadership Enterprise Deployments
#1
• In business 13 years
• Campbell, CA
headquarters
• 200+ global channel
partners
• Independent Network
Access Control (NAC)
Market Leader
• Focus: Pervasive
Network Security
• 1,800+ customers worldwide
• Financial services, government,
healthcare, manufacturing,
retail, education
• From 100 to >1M endpoints
• From 62 countries around the
world
© 2014 ForeScoutTechnologies, Page 12
*Magic Quadrant for Network Access
Control, December 2014, Gartner Inc.
*This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from ForeScout. Gartner
does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research
publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any
warranties of merchantability or fitness for a particular purpose. Gartner "Magic Quadrant for Network Access Control,” Lawrence Orans and Claudio Neiva, December 10, 2014.
© 2014 ForeScoutTechnologies, Page 13
Device type, owner,
login, location
Applications,
security profile
Captures transient
users and devices
Real-time
Intelligence
© 2014 ForeScoutTechnologies, Page 14
Device and user-
specific policies
Mitigate OS,
configuration and
security risks
Start/stop
applications and
disable peripherals
Real-time
Intelligence
Granular
Controls
© 2014 ForeScoutTechnologies, Page 15
Real-time
Intelligence
Granular
Controls
Information Sharing
and Automation
Bi-directional
information exchange
Automated mitigation
and control
Enhanced
collaboration
© 2014 ForeScoutTechnologies, Page 16
See
Grant
Fix
Protect
Who and what are on your network?
Allow, limit or block
network access
Remediate Endpoint Systems
Block internal attack
© 2014 ForeScoutTechnologies, Page 17
© 2014 ForeScoutTechnologies, Page 18
Who are you? Who owns your
device?
What type of
device?
What is the
device hygiene?
• Employee
• Partner
• Contractor
• Guest
• Corporate
• BYOD
• Rogue
• Windows, Mac
• iOS, Android
• VM
• Non-user
devices
• Configuration
• Software
• Services
• Patches
• Security Agents
• Switch
• Controller
• VPN
• Port, SSID
• IP, MAC
• VLAN
Where/how are
you connecting?
© 2014 ForeScoutTechnologies, Page 19
Dynamic and Multi-faceted
DHCP
REQUESTS
AD, LDAP, RADIUS
SERVER
AGENT ACTIVE
DIRECTORY
MIRROR
TRAFFIC
NMAP SCAN
© 2014 ForeScoutTechnologies, Page 20
Complete Situational Awareness
© 2014 ForeScoutTechnologies, Page 21
Complete Situational Awareness
Compliance Problems:
Agents, Apps, Vulnerabilities,
Configurations
See Devices:
Managed, Unmanaged, Wired,
Wireless,
PC, Mobile…
© 2014 ForeScoutTechnologies, Page 22
Complete Situational Awareness
Filter Information By:
Business Unit,
Location,
Device Type…
© 2014 ForeScoutTechnologies, Page 23
Complete Situational Awareness
See Device Details:
What, Where, Who,
Security Posture…
© 2014 ForeScoutTechnologies, Page 24
Complete Situational Awareness
Site Summary:
Devices,
Policy Violations…
© 2014 ForeScoutTechnologies, Page 25
© 2014 ForeScoutTechnologies, Page 26
Modest Strong
Open trouble ticket
Send email notification
SNMP Traps
Start application
Run script
Auditable end-user
acknowledgement
Send information to external
systems such as SIEM etc.
HTTP browser hijack
Deploy a virtual firewall around
the device
Reassign the device to a VLAN
with restricted access
Update access lists (ACLs) on
switches, firewalls and routers to
restrict access
DNS hijack (captive portal)
Automatically move device to a
pre- configured guest network
Trigger external controls such as
endpoint protection, VA etc.
Move device to quarantine VLAN
Block access with 802.1X
Alter login credentials to block
access, VPN block
Block access with device
authentication
Turn off switch port (802.1X,
SNMP)
Install/update agents, trigger
external remediation systems
Wi-Fi port block
Alert / Allow Trigger / Limit Remediate / Block
© 2014 ForeScoutTechnologies, Page 27
• Visibility of corporate and
personal devices
• Network Access Control
– Identify who, what, where, when,
configuration, security posture
• Flexible policy controls
– Register guests
– Grant access (none, limited, full)
– Enforce time of day, connection
type, device type controls
• Block unauthorized devices
from the network
EMPLOYEE
CONTRACTOR
GUEST
UNAUTHORIZED
WEB EMAIL CRM
© 2014 ForeScoutTechnologies, Page 28
User Type
Limited Internal Access
Authenticate via
Contractor Credentials
BYOD Posture Check
Contractor/PartnerGuest
Internet Access
Guest Registration
Sponsor
Authorization
Personal Device Corporate Asset
Authenticate via
Corporate Credentials
BYOD
Posture Check
Internal Access
Corporate Asset
Posture Check
Employee
© 2014 ForeScoutTechnologies, Page 29
© 2014 ForeScoutTechnologies, Page 30
CORE
SWITCHES
ACTIVE
DIRECTORY
SCCM
ENDPOINT
PROTECTION
SIEM
VA
MDM
ATD
DATACENTER
REMOTE USERS VPN CONCENTRATOR
COUNTERACT
ENTERPRISE
MANAGER
SERVERFARM
© 2014 ForeScoutTechnologies, Page 31
DATACENTER
REMOTE USERS VPN CONCENTRATOR
ACTIVE
DIRECTORY
SCCM
ENDPOINT
PROTECTION
SIEM
VA
MDM
ATD
COUNTERACT
ENTERPRISE
MANAGER
CORE
SWITCHES
SERVERFARM
© 2014 ForeScoutTechnologies, Page 32
CORE
SWITCHES
DATACENTER
REMOTE USERS VPN CONCENTRATOR
COUNTERACT
ENTERPRISE
MANAGER
ACTIVE
DIRECTORY
SCCM
ENDPOINT
PROTECTION
SIEM
VA
MDM
ATD
CounterACT Deployed at the Core Layer
Management Port
Mirror Traffic
© 2014 ForeScoutTechnologies, Page 33
© 2014 ForeScoutTechnologies, Page 34
Switches & Routers
Network Devices
Endpoints
IT Network Services
Wireless
Firewall & VPN
Endpoint & APT Protection
Vulnerability Assessment
SIEM/GRC
MDM
© 2014 ForeScoutTechnologies, Page 35
© 2014 ForeScoutTechnologies, Page 36
• Visibility of all devices,
unmanaged & rogue
• Does not require agents
• Automate agent installation,
activation, update
• Quarantine and remediate
• Bi-directional integration
– Endpoint protection
– Vulnerability Assessment
– Advanced Threat Detection
– Patch management ForeScout
© 2014 ForeScoutTechnologies, Page 37
• ForeScout sends both low-level (who, what, where) and high-level (compliance status)
information about endpoints to SIEM
• SIEM correlates ForeScout information with information from other sources and
identifies risks posed by infected, malicious or high-risk endpoints
• SIEM initiates automated risk mitigation using ForeScout
• ForeScout takes risk mitigation action on endpoint
SIEM
Real-time Info
Correlate, Identify Risks
Initiate Mitigation
Remediate
Quarantine
© 2014 ForeScoutTechnologies, Page 38
Initiate Scan
Scan
Scan Results
Connect
Blockor
Allow
EndpointSwitch
Vulnerability
Assessment
System
© 2014 ForeScoutTechnologies, Page 39
Visibility
• Detection of virtual machines that are located in the wrong zone (e.g. port group)
• Detection of virtual machines that lack an up-to-date version of VMware tools
• Detection of peripheral devices (e.g. a physical USB drive) connected to a virtual
machine
• Detection of the hardware associated with each virtual machine
• Detection of the guest operating system running on each virtual machine
© 2014 ForeScoutTechnologies, Page 40
VMware vSphere VMware vSphere VMware vSphere
VMware vCenter Server
Manage
vSphere Distributed Switch
VMware Plugins
Mirror Traffic
© 2014 ForeScoutTechnologies, Page 41
Core Switch Virtual Environment
Server Virtualization
Virtual Desktop Infrastructure
Endpoint
• Mobile Phone
• Laptop
• PC Desktop
• Printer
• VOIP
Thin Client
Policy for Virtual
Policy for Physical Desktop
Policy for Thin Client
ForeScout
© 2014 ForeScoutTechnologies, Page 43
Web Services API LDAPSQL
© 2014 ForeScoutTechnologies, Page 44
© 2014 ForeScoutTechnologies, Page 45
• Mobility and BYOD are
transforming the enterprise
– Mobile device adoption
and diversity has exploded
– Enterprise perimeter becoming
more open and extended
– Over 60% of employees
use a personal device for work1
– Capabilities of consumer
technology meet or exceed
the features of IT-supplied assets
– Employees can purchase
and use mobile technology
faster than IT adoption cycles
1 Gartner, “Bring Your Own Device: The Facts and the Future”, April 2013, David A. Willis
1
© 2014 ForeScoutTechnologies, Page 46
Secure the Device Secure the Data Secure the Network
• Secure configuration
• Enforce passwords
• Control user actions
• Manage content & apps
• Protect privacy
• Remote wiping
Mobile Device
Management
(MDM)
• What is on my network?
• Control access
• Enforce security posture
MDM + MCM
+
VDI
Next-Generation
Network Access
Control (NAC)
© 2014 ForeScoutTechnologies, Page 47
• 100% visibility of all mobile devices,
including those not yet enrolled in
the MDM system
• Prevent unauthorized devices from
accessing the network.
• More highly automated MDM
enrollment process
• Real-time security posture
assessment upon network
connection
• Unified compliance reporting of all
network devices – Windows, Mac,
phones, tablets, etc. ForeScout CounterACT
© 2014 ForeScoutTechnologies, Page 48
) ) ) ) ) ) )

?

– Device connects to network
 Classify by type
 Check for mobile agent
– If agent is missing
 Quarantine device
 Install mobile agent
(HTTP Redirect)
– Once agent is activated
 Check compliance
 Allow policy-based access
 Continue monitoring
Enterprise
Network
MDM
MDM
1
2
3
Device can access to internal server
ForeScout
CounterACT
© 2014 ForeScoutTechnologies, Page 49
Device-based control Network-based control
Enterprise App Mgmt
(Distribution, Config)
Inventory
Management
Device Management
(App Inventory,
Remote Wipe, etc.)
Policy Compliance
(Jailbreak detection, PIN
lock, etc.)
Secure Data
Containers
Guest
Registration
Network Access Control
(Wireless, Wired, VPN)
Cert + Supplicant
Provisioning
Mobile + PC
Network Threat
Prevention
Visibility of
Unmanaged Devices
© 2014 ForeScoutTechnologies, Page 50
© 2014 ForeScoutTechnologies, Page 51
ต้องการระบบ Authentication สําหรับพนักงาน
ภายในองค์กรทั้งหมด โดยสามารถทําได้ทั้ง
ระบบ Wired และ Wireless ภายในอุปกรณ์ชุด
เดียว
• User ทําการ Authenticationผ่าน ForeScout
• ทํา MAC Authenticationให้กับผู้บริหาร
• ตรวจสอบ Antivirus Compliance
(Installed/Running)
• ส่ง HTTP Notification แจ้งเตือนเครื่องที่ไม่ติดตั้ง
Antivirus
© 2014 ForeScoutTechnologies, Page 52
ต้องการระบบ Authentication และระบบ
Hardware/Software Inventory ภายในอุปกรณ์ชุด
เดียว
• ทําระบบ BYOD
• User ทําการ Authentication ผ่าน ForeScout
• ใช้งานร่วมกับระบบ MDM
• ตรวจสอบ Endpoint Compliance
• Threat Prevention
• ประกาศข่าวสารผ่าน HTTP Notification
© 2014 ForeScoutTechnologies, Page 53
© 2014 ForeScoutTechnologies, Page 54
Corporate Resources
Endpoints
VM
VM
VM
VM
VM
VM
VM
VM
VM
VM
VM
Non-corporate
VM
Users
Applications
Network
Devices
Antivirusout ofdate
Unauthorizedapplication
Agents not installedor
not running
ForeScout Continuous Monitoring and Mitigation
© 2014 ForeScoutTechnologies, Page 55
Endpoint
Mitigation
Endpoint
Authentication
& Inspection
Network
Enforcement
Information
Integration
Continuous
Visibility
© 2014 ForeScoutTechnologies, Page 56
Fast and easy to
deploy
Infrastructure
Agnostic
Flexible and
Customizable
Agentless and
non-disruptive
Scalable, no
re-architecting
Works with mixed,
legacy environment
Avoid vendor
lock-in
Optimized for
diversity and BYOD
Supports open
integration standards
© 2014 ForeScoutTechnologies, Page 57
SUITE OF
PACKAGED
SOFTWARE
INTEGRATION
MODULES
Vulnerability Assessment
Advance Threat Detection
SIEM (Bi-directional)
MDM
McAfee ePO
Open
(CustomerDevelopment)
FAMILY OF
APPLIANCE
MANAGERS
Asingle appliance to handle
up to # of ForeScout
appliances
5
10
25
50
100
150
200
Virtual appliances are also
available.
FAMILY OF
APPLIANCES
Asingle appliance to handle
up to # of endpoints
Endpoints
100
500
1,000
2,500
4,000
10,000
Virtual appliances are also
available.
© 2014 ForeScoutTechnologies, Page 58
Choose ForeScout when you need…
• Hardware & Software Inventory
• Network Access Control
• BYOD Security
• Guest Networking
• Endpoint Compliance
• Threat Prevention
CT- 4000
CT-R
CT-100
CT-1000
CT-2000

More Related Content

What's hot

Seguridad De La información
Seguridad De La informaciónSeguridad De La información
Seguridad De La informaciónLiliana Pérez
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Controles iso27002 2013
Controles iso27002 2013Controles iso27002 2013
Controles iso27002 2013lederzon
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdfAhmedRKhan
 
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3UnioGeek
 
The Evolution of the Datacenter
The Evolution of the DatacenterThe Evolution of the Datacenter
The Evolution of the DatacenterStackIQ
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfLBagger1
 
Auditoria Informatica Antonio Bracamonte
Auditoria Informatica Antonio BracamonteAuditoria Informatica Antonio Bracamonte
Auditoria Informatica Antonio BracamonteAntonio Gallo
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersSchneider Electric
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpointvoliverio
 
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...Precisely
 

What's hot (20)

Control acceso
Control accesoControl acceso
Control acceso
 
Seguridad De La información
Seguridad De La informaciónSeguridad De La información
Seguridad De La información
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Control interno y auditoria informática
Control interno y auditoria informáticaControl interno y auditoria informática
Control interno y auditoria informática
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Controles iso27002 2013
Controles iso27002 2013Controles iso27002 2013
Controles iso27002 2013
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
 
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
 
The Evolution of the Datacenter
The Evolution of the DatacenterThe Evolution of the Datacenter
The Evolution of the Datacenter
 
CIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdfCIS20 CSCs+mapping to NIST+ISO.pdf
CIS20 CSCs+mapping to NIST+ISO.pdf
 
Auditoria Informatica Antonio Bracamonte
Auditoria Informatica Antonio BracamonteAuditoria Informatica Antonio Bracamonte
Auditoria Informatica Antonio Bracamonte
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data Centers
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
 
DCIM
DCIMDCIM
DCIM
 
Agile security
Agile securityAgile security
Agile security
 
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...
Enriching ServiceNow Discovery and Service Mapping with Mainframe Machine and...
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Viewers also liked

Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionConor Ryan
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess ControlGionni Lúcio
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NACdigitallibrary
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NACLarry Smarr
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation MedCouncilCan
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDNKyunghee Univ
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISECisco Canada
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Muhammed, a.s., kao paradigma savršenog odgajatelja
Muhammed, a.s., kao paradigma savršenog odgajateljaMuhammed, a.s., kao paradigma savršenog odgajatelja
Muhammed, a.s., kao paradigma savršenog odgajateljaFahrudin Vojić
 

Viewers also liked (20)

Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
 
Nac market
Nac marketNac market
Nac market
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NAC
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Nama
NamaNama
Nama
 
CryptTech 2015
CryptTech 2015CryptTech 2015
CryptTech 2015
 
Muhammed, a.s., kao paradigma savršenog odgajatelja
Muhammed, a.s., kao paradigma savršenog odgajateljaMuhammed, a.s., kao paradigma savršenog odgajatelja
Muhammed, a.s., kao paradigma savršenog odgajatelja
 
yammer
yammeryammer
yammer
 

Similar to Throughwave Day 2015 - ForeScout Automated Security Control

NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Nextel S.A.
 
How the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentHow the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentErika Barron
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_usersCristian Garcia G.
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideInstaSafe Technologies
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)Open Analytics
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingVi Tính Hoàng Nam
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSiQHub
 

Similar to Throughwave Day 2015 - ForeScout Automated Security Control (20)

NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
How the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to DevelopmentHow the Cloud Shifts the Burden of Security to Development
How the Cloud Shifts the Burden of Security to Development
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative Guide
 
CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)CDM….Where do you start? (OA Cyber Summit)
CDM….Where do you start? (OA Cyber Summit)
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 

More from Aruj Thirawat

Thailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandThailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandAruj Thirawat
 
Global Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepGlobal Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepAruj Thirawat
 
STelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetSTelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetAruj Thirawat
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsAruj Thirawat
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureAruj Thirawat
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsAruj Thirawat
 
Radware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityRadware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityAruj Thirawat
 
Vidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerVidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerAruj Thirawat
 
ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015Aruj Thirawat
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Aruj Thirawat
 
Netapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicNetapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicAruj Thirawat
 
Solarwinds - understand and optimize
Solarwinds - understand and optimizeSolarwinds - understand and optimize
Solarwinds - understand and optimizeAruj Thirawat
 
How to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersHow to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersAruj Thirawat
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandAruj Thirawat
 
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandServers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandAruj Thirawat
 
Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Aruj Thirawat
 

More from Aruj Thirawat (17)

Thailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet ThailandThailand Threat Telemetry 2016 by Fortinet Thailand
Thailand Threat Telemetry 2016 by Fortinet Thailand
 
Global Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-SepGlobal Knowledge Training Courses & Promotion 2015-Sep
Global Knowledge Training Courses & Promotion 2015-Sep
 
STelligence Savvius Thai Datasheet
STelligence Savvius Thai DatasheetSTelligence Savvius Thai Datasheet
STelligence Savvius Thai Datasheet
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT InfrastructureThroughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
Throughwave Day 2015 - Throughwave Next Generation Enterprise IT Infrastructure
 
Splunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of ThingsSplunk - Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of Things
 
Radware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not RealityRadware - When It Comes to ADCs, Perception is Not Reality
Radware - When It Comes to ADCs, Perception is Not Reality
 
Vidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration PartnerVidyo - Why Vidyo is Your Video Collaboration Partner
Vidyo - Why Vidyo is Your Video Collaboration Partner
 
ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015ThaiCert Phishing and Malicious Code Infographic 2015
ThaiCert Phishing and Malicious Code Infographic 2015
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Netapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology InfographicNetapp Introduction to Flash Technology Infographic
Netapp Introduction to Flash Technology Infographic
 
Solarwinds - understand and optimize
Solarwinds - understand and optimizeSolarwinds - understand and optimize
Solarwinds - understand and optimize
 
How to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for BeginnersHow to Choose Your SAN Storage Hardware for Beginners
How to Choose Your SAN Storage Hardware for Beginners
 
Cloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - ThailandCloud Technology Brief 2013 Q1 - Thailand
Cloud Technology Brief 2013 Q1 - Thailand
 
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - ThailandServers Technologies and Enterprise Data Center Trends 2014 - Thailand
Servers Technologies and Enterprise Data Center Trends 2014 - Thailand
 
Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014Throughwave Thailand Recruitment Presentation 2014
Throughwave Thailand Recruitment Presentation 2014
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Throughwave Day 2015 - ForeScout Automated Security Control

  • 2. © 2014 ForeScoutTechnologies, Page 2 • Enterprise Security Trend • ForeScout Capabilities • ForeScout Integration • BYOD Security • Case Studies • Conclusion
  • 4. © 2014 ForeScoutTechnologies, Page 4 Corporate Resources Antivirusout ofdate Unauthorizedapplication Agents not installedor not running Endpoints VM VM VM VM VM VM VM VM VM VM VM Non-corporate VM Users Applications Network Devices
  • 8. © 2014 ForeScoutTechnologies, Page 8 • Complex architecture • Requires reconfiguration and upgrade of existing switches • Requires installation of endpoint agents • Requires 802.1X • Long drawn-out implementations • Brittle, prone to disruption and breakage Outdated NAC
  • 9. © 2014 ForeScoutTechnologies, Page 9 Fast and easy deployment – No infrastructure changes or network upgrades – No need for endpoint agents – 802.1X is optional – Integrated appliance (physical or virtual) Streamline and automate existing IT processes – Guest registration – MDM enrollment – BYOD onboarding – Asset intelligence Shift away from restrictive allow-or-deny policies – Flexible controls, based on user and device context – Preserve user experience Integrate with other IT systems – Break down information silos – Reduce window of vulnerability by automating controls & actions
  • 11. © 2014 ForeScoutTechnologies, Page 11 Strong Foundation Market Leadership Enterprise Deployments #1 • In business 13 years • Campbell, CA headquarters • 200+ global channel partners • Independent Network Access Control (NAC) Market Leader • Focus: Pervasive Network Security • 1,800+ customers worldwide • Financial services, government, healthcare, manufacturing, retail, education • From 100 to >1M endpoints • From 62 countries around the world
  • 12. © 2014 ForeScoutTechnologies, Page 12 *Magic Quadrant for Network Access Control, December 2014, Gartner Inc. *This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner "Magic Quadrant for Network Access Control,” Lawrence Orans and Claudio Neiva, December 10, 2014.
  • 13. © 2014 ForeScoutTechnologies, Page 13 Device type, owner, login, location Applications, security profile Captures transient users and devices Real-time Intelligence
  • 14. © 2014 ForeScoutTechnologies, Page 14 Device and user- specific policies Mitigate OS, configuration and security risks Start/stop applications and disable peripherals Real-time Intelligence Granular Controls
  • 15. © 2014 ForeScoutTechnologies, Page 15 Real-time Intelligence Granular Controls Information Sharing and Automation Bi-directional information exchange Automated mitigation and control Enhanced collaboration
  • 16. © 2014 ForeScoutTechnologies, Page 16 See Grant Fix Protect Who and what are on your network? Allow, limit or block network access Remediate Endpoint Systems Block internal attack
  • 18. © 2014 ForeScoutTechnologies, Page 18 Who are you? Who owns your device? What type of device? What is the device hygiene? • Employee • Partner • Contractor • Guest • Corporate • BYOD • Rogue • Windows, Mac • iOS, Android • VM • Non-user devices • Configuration • Software • Services • Patches • Security Agents • Switch • Controller • VPN • Port, SSID • IP, MAC • VLAN Where/how are you connecting?
  • 19. © 2014 ForeScoutTechnologies, Page 19 Dynamic and Multi-faceted DHCP REQUESTS AD, LDAP, RADIUS SERVER AGENT ACTIVE DIRECTORY MIRROR TRAFFIC NMAP SCAN
  • 20. © 2014 ForeScoutTechnologies, Page 20 Complete Situational Awareness
  • 21. © 2014 ForeScoutTechnologies, Page 21 Complete Situational Awareness Compliance Problems: Agents, Apps, Vulnerabilities, Configurations See Devices: Managed, Unmanaged, Wired, Wireless, PC, Mobile…
  • 22. © 2014 ForeScoutTechnologies, Page 22 Complete Situational Awareness Filter Information By: Business Unit, Location, Device Type…
  • 23. © 2014 ForeScoutTechnologies, Page 23 Complete Situational Awareness See Device Details: What, Where, Who, Security Posture…
  • 24. © 2014 ForeScoutTechnologies, Page 24 Complete Situational Awareness Site Summary: Devices, Policy Violations…
  • 26. © 2014 ForeScoutTechnologies, Page 26 Modest Strong Open trouble ticket Send email notification SNMP Traps Start application Run script Auditable end-user acknowledgement Send information to external systems such as SIEM etc. HTTP browser hijack Deploy a virtual firewall around the device Reassign the device to a VLAN with restricted access Update access lists (ACLs) on switches, firewalls and routers to restrict access DNS hijack (captive portal) Automatically move device to a pre- configured guest network Trigger external controls such as endpoint protection, VA etc. Move device to quarantine VLAN Block access with 802.1X Alter login credentials to block access, VPN block Block access with device authentication Turn off switch port (802.1X, SNMP) Install/update agents, trigger external remediation systems Wi-Fi port block Alert / Allow Trigger / Limit Remediate / Block
  • 27. © 2014 ForeScoutTechnologies, Page 27 • Visibility of corporate and personal devices • Network Access Control – Identify who, what, where, when, configuration, security posture • Flexible policy controls – Register guests – Grant access (none, limited, full) – Enforce time of day, connection type, device type controls • Block unauthorized devices from the network EMPLOYEE CONTRACTOR GUEST UNAUTHORIZED WEB EMAIL CRM
  • 28. © 2014 ForeScoutTechnologies, Page 28 User Type Limited Internal Access Authenticate via Contractor Credentials BYOD Posture Check Contractor/PartnerGuest Internet Access Guest Registration Sponsor Authorization Personal Device Corporate Asset Authenticate via Corporate Credentials BYOD Posture Check Internal Access Corporate Asset Posture Check Employee
  • 30. © 2014 ForeScoutTechnologies, Page 30 CORE SWITCHES ACTIVE DIRECTORY SCCM ENDPOINT PROTECTION SIEM VA MDM ATD DATACENTER REMOTE USERS VPN CONCENTRATOR COUNTERACT ENTERPRISE MANAGER SERVERFARM
  • 31. © 2014 ForeScoutTechnologies, Page 31 DATACENTER REMOTE USERS VPN CONCENTRATOR ACTIVE DIRECTORY SCCM ENDPOINT PROTECTION SIEM VA MDM ATD COUNTERACT ENTERPRISE MANAGER CORE SWITCHES SERVERFARM
  • 32. © 2014 ForeScoutTechnologies, Page 32 CORE SWITCHES DATACENTER REMOTE USERS VPN CONCENTRATOR COUNTERACT ENTERPRISE MANAGER ACTIVE DIRECTORY SCCM ENDPOINT PROTECTION SIEM VA MDM ATD CounterACT Deployed at the Core Layer Management Port Mirror Traffic
  • 34. © 2014 ForeScoutTechnologies, Page 34 Switches & Routers Network Devices Endpoints IT Network Services Wireless Firewall & VPN Endpoint & APT Protection Vulnerability Assessment SIEM/GRC MDM
  • 36. © 2014 ForeScoutTechnologies, Page 36 • Visibility of all devices, unmanaged & rogue • Does not require agents • Automate agent installation, activation, update • Quarantine and remediate • Bi-directional integration – Endpoint protection – Vulnerability Assessment – Advanced Threat Detection – Patch management ForeScout
  • 37. © 2014 ForeScoutTechnologies, Page 37 • ForeScout sends both low-level (who, what, where) and high-level (compliance status) information about endpoints to SIEM • SIEM correlates ForeScout information with information from other sources and identifies risks posed by infected, malicious or high-risk endpoints • SIEM initiates automated risk mitigation using ForeScout • ForeScout takes risk mitigation action on endpoint SIEM Real-time Info Correlate, Identify Risks Initiate Mitigation Remediate Quarantine
  • 38. © 2014 ForeScoutTechnologies, Page 38 Initiate Scan Scan Scan Results Connect Blockor Allow EndpointSwitch Vulnerability Assessment System
  • 39. © 2014 ForeScoutTechnologies, Page 39 Visibility • Detection of virtual machines that are located in the wrong zone (e.g. port group) • Detection of virtual machines that lack an up-to-date version of VMware tools • Detection of peripheral devices (e.g. a physical USB drive) connected to a virtual machine • Detection of the hardware associated with each virtual machine • Detection of the guest operating system running on each virtual machine
  • 40. © 2014 ForeScoutTechnologies, Page 40 VMware vSphere VMware vSphere VMware vSphere VMware vCenter Server Manage vSphere Distributed Switch VMware Plugins Mirror Traffic
  • 41. © 2014 ForeScoutTechnologies, Page 41 Core Switch Virtual Environment Server Virtualization Virtual Desktop Infrastructure Endpoint • Mobile Phone • Laptop • PC Desktop • Printer • VOIP Thin Client Policy for Virtual Policy for Physical Desktop Policy for Thin Client ForeScout
  • 42. © 2014 ForeScoutTechnologies, Page 43 Web Services API LDAPSQL
  • 44. © 2014 ForeScoutTechnologies, Page 45 • Mobility and BYOD are transforming the enterprise – Mobile device adoption and diversity has exploded – Enterprise perimeter becoming more open and extended – Over 60% of employees use a personal device for work1 – Capabilities of consumer technology meet or exceed the features of IT-supplied assets – Employees can purchase and use mobile technology faster than IT adoption cycles 1 Gartner, “Bring Your Own Device: The Facts and the Future”, April 2013, David A. Willis 1
  • 45. © 2014 ForeScoutTechnologies, Page 46 Secure the Device Secure the Data Secure the Network • Secure configuration • Enforce passwords • Control user actions • Manage content & apps • Protect privacy • Remote wiping Mobile Device Management (MDM) • What is on my network? • Control access • Enforce security posture MDM + MCM + VDI Next-Generation Network Access Control (NAC)
  • 46. © 2014 ForeScoutTechnologies, Page 47 • 100% visibility of all mobile devices, including those not yet enrolled in the MDM system • Prevent unauthorized devices from accessing the network. • More highly automated MDM enrollment process • Real-time security posture assessment upon network connection • Unified compliance reporting of all network devices – Windows, Mac, phones, tablets, etc. ForeScout CounterACT
  • 47. © 2014 ForeScoutTechnologies, Page 48 ) ) ) ) ) ) )  ?  – Device connects to network  Classify by type  Check for mobile agent – If agent is missing  Quarantine device  Install mobile agent (HTTP Redirect) – Once agent is activated  Check compliance  Allow policy-based access  Continue monitoring Enterprise Network MDM MDM 1 2 3 Device can access to internal server ForeScout CounterACT
  • 48. © 2014 ForeScoutTechnologies, Page 49 Device-based control Network-based control Enterprise App Mgmt (Distribution, Config) Inventory Management Device Management (App Inventory, Remote Wipe, etc.) Policy Compliance (Jailbreak detection, PIN lock, etc.) Secure Data Containers Guest Registration Network Access Control (Wireless, Wired, VPN) Cert + Supplicant Provisioning Mobile + PC Network Threat Prevention Visibility of Unmanaged Devices
  • 50. © 2014 ForeScoutTechnologies, Page 51 ต้องการระบบ Authentication สําหรับพนักงาน ภายในองค์กรทั้งหมด โดยสามารถทําได้ทั้ง ระบบ Wired และ Wireless ภายในอุปกรณ์ชุด เดียว • User ทําการ Authenticationผ่าน ForeScout • ทํา MAC Authenticationให้กับผู้บริหาร • ตรวจสอบ Antivirus Compliance (Installed/Running) • ส่ง HTTP Notification แจ้งเตือนเครื่องที่ไม่ติดตั้ง Antivirus
  • 51. © 2014 ForeScoutTechnologies, Page 52 ต้องการระบบ Authentication และระบบ Hardware/Software Inventory ภายในอุปกรณ์ชุด เดียว • ทําระบบ BYOD • User ทําการ Authentication ผ่าน ForeScout • ใช้งานร่วมกับระบบ MDM • ตรวจสอบ Endpoint Compliance • Threat Prevention • ประกาศข่าวสารผ่าน HTTP Notification
  • 53. © 2014 ForeScoutTechnologies, Page 54 Corporate Resources Endpoints VM VM VM VM VM VM VM VM VM VM VM Non-corporate VM Users Applications Network Devices Antivirusout ofdate Unauthorizedapplication Agents not installedor not running ForeScout Continuous Monitoring and Mitigation
  • 54. © 2014 ForeScoutTechnologies, Page 55 Endpoint Mitigation Endpoint Authentication & Inspection Network Enforcement Information Integration Continuous Visibility
  • 55. © 2014 ForeScoutTechnologies, Page 56 Fast and easy to deploy Infrastructure Agnostic Flexible and Customizable Agentless and non-disruptive Scalable, no re-architecting Works with mixed, legacy environment Avoid vendor lock-in Optimized for diversity and BYOD Supports open integration standards
  • 56. © 2014 ForeScoutTechnologies, Page 57 SUITE OF PACKAGED SOFTWARE INTEGRATION MODULES Vulnerability Assessment Advance Threat Detection SIEM (Bi-directional) MDM McAfee ePO Open (CustomerDevelopment) FAMILY OF APPLIANCE MANAGERS Asingle appliance to handle up to # of ForeScout appliances 5 10 25 50 100 150 200 Virtual appliances are also available. FAMILY OF APPLIANCES Asingle appliance to handle up to # of endpoints Endpoints 100 500 1,000 2,500 4,000 10,000 Virtual appliances are also available.
  • 57. © 2014 ForeScoutTechnologies, Page 58 Choose ForeScout when you need… • Hardware & Software Inventory • Network Access Control • BYOD Security • Guest Networking • Endpoint Compliance • Threat Prevention CT- 4000 CT-R CT-100 CT-1000 CT-2000