Latest Headlines | Latest Press Releases | Latest Webcasts | Latest Case Studies| Latest Videos/Podcasts | Latest Research | Latest Recognition | Latest Reviews | Upcoming Events
“ForeScout CounterACT 7 is a next-generation network access control (NAC) solution that enables companies to continuously monitor and mitigate security exposures and cyberthreats…IAIT, an independent testing laboratory based in Germany, examined CounterACT under great scrutiny with a practical test that integrated the appliance into a corporate network; engaged discovery and monitoring services; designed policies for classification, rogue detection and blocking, guest and mobile device management, and endpoint compliance and remediation; and conducted third-party system integration.”
April 8, 2014
ForeScout Releases Definitive Guide to Next-generation Network Access Control
“The “Definitive Guide to Next-generation Network Access Control” provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.”
February 24, 2014
ForeScout to Extend Endpoint Visibility and Control Beyond the Enterprise Network with CounterACT RemoteControl
“CounterACT RemoteControl, which enables IT organizations an easy and effective means to monitor and enforce policy of remote corporate and personally owned devices…Driven by customer demand, ForeScout will reduce these risks by enabling its award-winning ForeScout CounterACT™ platform to continuously monitor and bolster endpoint security for devices both on and off the network with the introduction of CounterACT RemoteControl.
corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen?
- How do you know what devices are accessing your network?
- How do you detect a rogue device?
- What can you do to prevent a threat in your network and minimize the risk?
Phil Hochmuth, security program analyst at IDC
Scott Gordon, chief marketing officer at ForeScout
This webinar examines BYOD trends and risks, the mobile security landscape, policy development and control options. The session will also present a tiered service approach to enterprise mobile security where complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.
- Real-world issues, considerations and operational impact
- Policy development processes to tolerate, support or embrace BYOD
- Why combine NAC, MDM and other technical controls
- How to devise tiered security service strategy
- Jeff Bradberry – IT Security Manager, BrightPoint
To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple specifications across difference compliance requisites. Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates. This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases. Attendees will discover:
- Key NAC functions that apply to compliance processes and specifications
- Real-world use cases; considerations, controls, activities and processes
- How NAC specifically maps to top commercial, regulatory and federal mandates
Trent University deployed ForeScout CounterACT across its three campuses in January 2013 and expanded its deployment at the main city site over the winter to cater to the university’s ever-increasing number of BYOD endpoints.
Gord Boyce, CEO of ForeScout, on ControlFabric platform
Gord Boyce, CEO, ForeScout, discusses the ForeScout ControlFabric platform in this short video. The ControlFabric™ platform is an open platform that enables ForeScout CounterACT and other IT solutions to exchange information and mitigate a wide variety of network and endpoint security concerns.
“For the third consecutive year ForeScout CounterACT was named by Gartner Inc. as a leader in its 2013 Magic Quadrant report for Network Access Control (NAC). ForeScout NAC innovations which includes its CounterACT platform and ControlFabric architecture also serve as the cornerstone technology addressing visibility, BYOD and continuous compliance trends.”
ForeScout demonstrated visionary leadership to enhance network security manageability with the introduction of ControlFabric architecture, demonstrating that the company ‘gets it.’ ControlFabric technology provides essential bi-directional interfaces and protocols for ‘visibility, intelligence, and remediation’ across multiple network, security, and management tool sets. Extending the CounterACT platform with ControlFabric enables network security vendors to work together and cooperate to make network security easier for security professionals to achieve continuous monitoring and mitigation capabilities.
“The big new thing from ForeScout this year is API and its new program/ecosystem. The company has written 66 integrations now and expects many other third-party vendors to join…Add to this a clear focus on bring-your-own-device (BYOD) and the idea of pervasive security throughout the enterprise and you have forward-looking thinking. ForeScout has traditionally been a NAC powerhouse. The experience and creativity that took it there has taken the company to the next levelwith the innovations of the past year”