Latest Headlines | Latest Press Releases | Latest Webcasts | Latest Case Studies| Latest Videos/Podcasts | Latest Research | Latest Recognition | Latest Reviews | Upcoming Events
American Banker | Penny Crosman | September 2014
How This Small Bank Kicks Cybercriminals Off Its Network
“Bremer Bank deployed network access control software prepackaged into a server — known as ForeScout Technologies’ CounterACT appliance — to control who can use its network and protect the endpoints.”
TechTarget | Gina Narcisi | August 2014
ForeScout CounterACT improves NAC, endpoint security for Midwest bank
“ForeScout has given Bremer Bank the ability to dynamically see all the known users, devices and applications on our network with a tremendous amount of detail and the means to perform actions in a single pane of glass.”
“Banks are asking employees to do more with less now as they try to cut operating costs, and bring-your-own-device policies can enable employees to be far more productive. But the threat of data breaches looms large over the industry, and more employee devices connected to a bank’s internal network inevitably increases vulnerabilities, making access control pivotal for any bank considering a BYOD policy.
For St. Paul, Minn.-based Bremer Bank (with $8.7 billion in assets) finding the right balance between network security and enabling employee productivity with BYOD had been a major challenge prior to its implementation of ForeScout CounterAct for network access control in 2012.”
“Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the third largest university system in the US in terms of enrollment, with a faculty and staff of 5,000 and student population of nearly 20,000.
In this interview he talks about his job, the biggest challenges and threats his team faces, exchanging knowledge, and more.”
The Wall Street Journal | Ben DiPietro | July 2014
Survey Roundup: Disconnect Between Regulators, Banks
“Cross-Industry Security Look: A survey of 1,600 IT security executives from five countries by IDG Connect and ForeScout Technologies looked at the nature and extent of security threats and defense maturity of companies in the finance, manufacturing, health-care, education and retail sectors. It found the health-care sector was more likely to experience higher-than-average compliance policy violations, while the manufacturing, education and finance sectors appear more prone to phishing attacks.”
Bremer Bank Selects ForeScout CounterACT for Real-time Visibility, Guest Access and Control Automation
“Prior to deploying ForeScout, Bremer had an existing network access control (NAC) implementation to manage a diverse range of corporate and user-owned devices. However, it required heavy IT support and was prone to false positives and other disruptions. To address those issues, the bank chose ForeScout CounterACT to boost security and access control for its network.”.
Security Leaders to Demonstrate Extensive Interoperability Advantages During ForeScout ControlFabric PlugFest at BlackHat USA 2014
“Showcasing a range of integrations with solutions from our industry-leading partners at BlackHat during our PlugFest further establishes CounterACT with ControlFabric architecture as a pragmatic and immediately applicable network security platform,” said Oded Comay, co-founder and chief technology officer at ForeScout Technologies.
ForeScout and Rapid7 Partner to Deliver Real-time Assessment and Remediation Capabilities
“Vulnerability management is a core practice security teams must have to manage the attack surface and minimize risk,” said Lee Weiner, SVP Products & Engineering at Rapid7. “By enabling our leading vulnerability management solution to work with ForeScout’s CounterACT platform, we can provide customers with a broader approach, not only to uncover and manage vulnerabilities, but also to automate the remediation process.”
“Independent research for the report was conducted by IDG Connect, and offers key insights into the nature of security issues impacting organizations; the perceived maturity of process, controls and tools applied to preempt and contain exposures; the state of confidence in security operations; and the most likely areas for future improvement and investment.”
Enabling pervasive network security
Description: An interactive webinar that will examine recent cyber defense research and explore the real-world application of next-gen NAC to enable pervasive network security.
The session is led by the book’s author Steve Piper, CEO of CyberEdge, and contributor Scott Gordon, CMO, ForeScout, who will be joined by Morris Altman, Director of Network Services, Internet Security Officer at Queens College of CUNY.
- Learn why NAC is in resurgence and what platforms offer
- Get a feel for selection and deployment do’s, don’t and gotcha’s
- See how to move to a continuous monitoring and mitigation stance
With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen?
- How do you know what devices are accessing your network?
- How do you detect a rogue device?
- What can you do to prevent a threat in your network and minimize the risk?
Architecting a Flexible Strategy for Securing Enterprise and Personal Mobile Devices
Phil Hochmuth, security program analyst at IDC
Scott Gordon, chief marketing officer at ForeScout
This webinar examines BYOD trends and risks, the mobile security landscape, policy development and control options. The session will also present a tiered service approach to enterprise mobile security where complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.
- Real-world issues, considerations and operational impact
- Policy development processes to tolerate, support or embrace BYOD
- Why combine NAC, MDM and other technical controls
- How to devise tiered security service strategy
Getting Through the Compliance Maze with NAC (60 minutes)
- Diana Kelly – IANS Faulty Advisory and Founder, SecurityCurve
- Jeff Bradberry – IT Security Manager, BrightPoint
To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple specifications across difference compliance requisites. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates. This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Attendees will discover:
- Key NAC functions that apply to compliance processes and specifications
- Real-world use cases; considerations, controls, activities and processes
- How NAC specifically maps to top commercial, regulatory and federal mandates
ForeScout CounterACT Improves Policy Enforcement for the Chio Lim Stone Forest group
After looking at several solutions, the CLSF group chose ForeScout CounterACT to improve network security and protect against the risks created by non-compliant endpoints.Read the full story »
Bremer Bank Selects ForeScout CounterACT for Real-time Visibility, Guest Access and Automated Controls
After an exhaustive evaluation process, Bremer Bank ultimately chose ForeScout CounterACT™ for its ease of installation, management capabilities and robust feature set. Read the full story »
Foursys Utilises ForeScout CounterACT to Secure Long Road College’s BYOD Environment
The college deployed ForeScout CounterACT to help manage an environment of 2,200 students and more than 1,500 network-connected endpoints, including BYOD devices.Read the full story »
ForeScout CounterACT Increases Visibility, Control and Compliance at Broward College
After looking at several solutions, Broward College selected ForeScout CounterACT for its extensive functionality and deployment ease that did not require agents. CounterACT provides real-time network visibility, flexible controls, BYOD policy enforcement and support for compliance.Read the full story »
Cyber Defense Matures in Las Vegas
Scott Gordon, CMO, FOreScout discussions value of ForeScout ControlFabric at the Blackhat Conference in Las Vegas.
Jon Oltsik: Next-Gen NAC evolves to Endpoint Visibility, Access and Security (EVAS)
Jon Oltsik, Sr. principal analyst for Enterprise Strategy Group, discusses endpoint visibility, access and security (EVAS) and ForeScout’s position.
Solving the Complexities with CounterACT – Frank Dickson
Frank Dixon, Industry Principal at Frost & Sullivan discusses how network and endpoint security is evolving towards continuous monitoring and response (two part video)
InfoSecurity Magazine Interview with Scott Gordon, CMO, ForeScout
Drew Amorosi, deputy editor of InfoSecurity, interviews Scott Gordon, Chief Marketing Officer at ForeScout, at InfoSecurity Europe 2013 about BYOD and NAC. (7 min.).
Frost & Sullivan Report: Continuous Compliance and Next Generation NAC
Traditional “defense-in-depth” strategy alone is not enough to effectively hinder hackers, mitigate violations and respond quickly enough to contain malware. This silo approach results in mounting security blind spots that present opportunities for violations, threats and attacks. The consequences can range from distracting to catastrophic impact. Put simply: enterprise IT organizations have incomplete knowledge of who or what is accessing or operating on their networks; nor do they have efficient means to enforce endpoint integrity or contain exposures. After years of protecting organizations’ networks from unauthorized access and malware and deploying numerous host-based defenses, Next-Generation Network Access Control (NAC) is fast developing a reputation as an indispensable security platform that offers a wealth of functionality predicated on the importance of dynamic endpoint intelligence and policy based remediation. This report examines in-depth how next-generation NAC technology enables continuous monitoring and advanced protection.Click here for full report
Architecting a Flexible Bring Your Own Device Strategy
The traditional enterprise perimeter is becoming more open and extended as the number of mobile and remote employees increases. The use of consumer mobile devices (such as smartphones and tablets) and the increased use of cloud services (individual tools such as Dropbox or business cloud applications such as Amazon Web Services) also challenge enterprise information security and IT risk management professionals. Organizations that leave networks wide open to employees’ mobile devices will have a hard time containing access to and controlling the use of sensitive corporate data in today’s extended computing environment. Conversely, enterprises that either lock down these devices or lock them out by configuring networks to offer them limited services are missing an opportunity to make employees more accessible, more productive, and more satisfied with their work environments. During the past 12 months, IDC has increasingly seen “hybridized” or joint NAC and MDM offerings whereby more progressive NAC vendors are integrating or offering their network-based security with MDM device-based security and vice versa. The hybrid approach preserves an often-required separation of duties between network/application and security operations while preserving the value for the security operator to see and manage all devices in one console. This report provide a pragmatic approach towards planning a BYOD security strategy that takes into account tiered levels of access, privileges, and controls, and looks at solutions that span network, device, user, application, and data controls and offer both on-premise and cloud architectures.Click here for the full report
ESG Report: The Endpoint Visibility, Access, and Security (EVAS) Market: The Evolution of Network Access Control (NAC)
Emerging in 2010, NAC began to occupy a valuable piece of real estate on more extended and open networks. NAC was in the right position to inspect devices, monitor activities, and enforce endpoint compliance policies in a growing number of use cases. The combination of new enterprise needs and vendor research and development greatly expanded the purview and role of NAC technology. As NAC enters its second decade, it has evolved beyond its original network access traffic cop role and now provides far greater functionality. As this continues, ESG believes that NAC is evolving beyond its original limited market into a new segment called Endpoint Visibility, Access, and Security (EVAS). ESG defines EVAS as: Network security technologies that provide policy-based intelligence, enforcement, and mitigation of all network device access, configuration, and activities for any node attached to an IP networkClick here for the full report
ForeScout Recognized as a Leader in the 2013 Magic Quadrant for Network Access Control
“For the third consecutive year ForeScout CounterACT was named by Gartner Inc. as a leader in its 2013 Magic Quadrant report for Network Access Control (NAC). ForeScout NAC innovations which includes its CounterACT platform and ControlFabric architecture also serve as the cornerstone technology addressing visibility, BYOD and continuous compliance trends.”Click here for the full report
Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security
ForeScout demonstrated visionary leadership to enhance network security manageability with the introduction of ControlFabric architecture, demonstrating that the company ‘gets it.’ ControlFabric technology provides essential bi-directional interfaces and protocols for ‘visibility, intelligence, and remediation’ across multiple network, security, and management tool sets. Extending the CounterACT platform with ControlFabric enables network security vendors to work together and cooperate to make network security easier for security professionals to achieve continuous monitoring and mitigation capabilities.Click here for full report
2013 Industry Innovators: Access control
“The big new thing from ForeScout this year is API and its new program/ecosystem. The company has written 66 integrations now and expects many other third-party vendors to join…Add to this a clear focus on bring-your-own-device (BYOD) and the idea of pervasive security throughout the enterprise and you have forward-looking thinking. ForeScout has traditionally been a NAC powerhouse. The experience and creativity that took it there has taken the company to the next levelwith the innovations of the past year”Click here for full report
IAIT |April 2014
2014 IAIT Product Review
“IAIT, an independent testing laboratory based in Germany, examined CounterACT under great scrutiny with a practical test that integrated the appliance into a corporate network; engaged discovery and monitoring services; designed policies for classification, rogue detection and blocking, guest and mobile device management, and endpoint compliance and remediation; and conducted third-party system integration.”
SC Magazine | October 2013
CounterACT v7.1 Review: 5-Star “Best Buy” Rating
“In preparation for our installation, ForeScout provided a hardware appliance (the CT 100 model) and a large amount of easy-to-read documentation. From unpacking the appliance to getting the system up and operational, it took under 30 minutes to start tracking data… This was a pleasing experience from beginning to end. Best Buy.”
ForeScout Technologies CounterACT 7.0
Network Computing | June 2013
“The phenomenal growth of BYOD (bring your own device) is fuelling increased interest in Network Access Control (NAC) as businesses expand their mobile workforce. ForeScout is a leader in this market for good reason because its CounterACT solution has benefited from continuous development, allowing it to stay ahead of the latest threats… ForeScout has innovatively moved NAC beyond traditional access control, offering businesses complete flexibility concerning the use of a wide range of computing devices and what they can do. Along with simplified deployment this latest version delivers a wealth of new features that will enhance flexibility for users and increase control for businesses in equal measure.”
ForeScout Proves NAC Superiority Over Other Leading Vendors in Independent Test
“Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. The complete 24-page report can be downloaded at http://www2.forescout.com/tolly_report.”