News

Latest Headlines | Latest Press Releases | Latest Webcasts | Latest Case Studies| Latest Videos/Podcasts | Latest Research | Latest Recognition | Latest Reviews | Upcoming Events

Latest Headlines

wallstreet-journal
The Wall Street Journal | Ben DiPietro | July 2014
Survey Roundup: Disconnect Between Regulators, Banks
“Cross-Industry Security Look: A survey of 1,600 IT security executives from five countries by IDG Connect and ForeScout Technologies looked at the nature and extent of security threats and defense maturity of companies in the finance, manufacturing, health-care, education and retail sectors. It found the health-care sector was more likely to experience higher-than-average compliance policy violations, while the manufacturing, education and finance sectors appear more prone to phishing attacks.”

 

business-insurance-logo
Business Insurance | Staff | July 17, 2014
Study shows 96% of organizations experienced significant security incident
“A report by ForeScout Technologies found that 96% of firms in the United States, the United Kingdom and DACH countries (Germany, Austria and Switzerland) experienced a serious IT security incident in the past year, Infosecurity reported.”

 

Canadian-underwriter-logo
Canadian Underwriter l Staff l July 17, 2014
Almost all organizations in new survey experienced a significant IT security incident in the past year
“The overwhelming majority, 96%, of surveyed organizations spanning five industries in the United States and Europe experienced a significant IT security incident in the past year, notes a new report issued Wednesday by ForeScout Technologies Inc.”

 

hospitalCIO-logo
Becker’s Hospital CIO l Akanksha Jayanth l July 17, 2014
Healthcare vs. The World: 5 Key Cybersecurity Findings
“Compared to four other key industries, the healthcare sector appears to be slightly behind in cyber defense maturity, according to a survey published by ForeScout Technologies and conducted by IDG Connect. “

 

mobihealthnews-logo
MobiHealthNews | Jonah Comstock | July 16, 2014
Survey: Healthcare industry has the most trouble with mobile device security
“Healthcare is falling behind other industries in prioritizing and attending to security concerns, according to a new report from security company ForeScout based on a survey conducted by IDG Connect.”

 

politico-logo
Politico | Joseph Marks | July 16, 2014
Morning Cybersecurity
“96 percent of organizations experienced a significant IT security incident in the past year, according to a survey of 1,600 IT professionals at companies with more than 500 employees.”

 

fiercesmartguide-logo
FierceSmartGrid | Barbara Vergetis Lundin | July 16, 2014
Threats to energy IT no different than other industries
“After interviewing 1,600 IT information security decision makers in organizations with more than 500 employees, spanning five industries in the U.S. and Europe, ForeScout Technologies, with the independent research conducted by IDG Connect, has found that more than 96 percent of organizations experienced a significant IT security incident in the past year.”

 

healthitsecurity
HealthITSecurity | Patrick Ouellette | July 16, 2014
Survey reviews IT security threats: Healthcare results
“A recent IDG Connect and ForeScout survey, titled the State of IT Cyber Defense Maturity Report, reviewed the different security threats posed against finance, manufacturing, healthcare, retail and education organizations across the world.”

 

InsideHigherEd-logo
Inside Higher ED | Staff | July 16, 2014
Confidence About Cybersecurity Lags in Academe
“Academe may be less prepared than the finance, health care and manufacturing sectors to tackle cybersecurity breaches, according to a report from the network security provider ForeScout Technologies, Inc.”

 

infosecurity
InfoSecurity | Staff | July 16, 2014
96% of Organizations Experienced a Serious Security Incident in the Past Year
“Security events have gone from pervasive to near-ubiquitous: The ForeScout Technologies 2014 Cyber Defence Maturity Report shows that 96% of organizations experienced a significant IT security incident in the past year.”

 

security-week_logo
SecurityWeek | Brian Prince | July 15, 2014
1 in 6 Say Their Organization Had At Least 5 Significant Security Incidents in Past Year: Survey
“A new report from ForeScout Technologies described a challenging world for IT security – one where one in six IT pros say their organization has had five or more significant security incidents in the past year.”

 

help net security
Help Net Security | Zeljka Zorz | July 15, 2014
“The majority of IT organizations are aware that some of their security measures are immature or ineffective, but only 33 percent have high confidence that their organizations will improve their less mature security controls.”

 

FierceCIO
Fierce CIO | David Weldon | July 2014
“Broward College has had a BYOD program for a few years, but it lacked control over user accounts and critical security. A network access control solution from ForeScout helped it get a handle on its newly-discovered 20,000-plus users.”

 

infosecurity
Infosecurity | Drew Amorosi | July 2014
“Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community.”

 

logo_CRN
CRN | Doug Woodburn | July 2014
“The NAC area is growing rapidly and we are seeing great success with our NAC partner ForeScout… Bradford Networks has confirmed a support rejig at the security vendor will leave it with no direct UK presence… the move could spark discontent in Bradford’s UK channel.”

 

IT-Security-Journal-logo
IT Security Journal | Kim Borg | June 2014
“The ForeScout CounterACT network security solution Pioneer chose to implement allowed them to gain intelligence, establish continuous monitoring, apply specific policies at both the client and network levels, and enhance control integration among different tools… that is where this is all heading as part of a more integrated intelligence and control architecture.”

 

networkworld
Network World | Ellen Messmer | June 2014
“Monitoring is done through security gear, such as unified threat management gateways and network-access control, to enforce policy… ForeScout’s network-access control appliance is used on the Broward campus network to block some policy violations right as they occur. “

 

FierceCIO
Fierce CIO | David Weldon | July 2014
“Broward College has had a BYOD program for a few years, but it lacked control over user accounts and critical security. A network access control solution from ForeScout helped it get a handle on its newly-discovered 20,000-plus users.”

 

logo_CRN
CRN | Doug Woodburn | July 2014
“The NAC area is growing rapidly and we are seeing great success with our NAC partner ForeScout… Bradford Networks has confirmed a support rejig at the security vendor will leave it with no direct UK presence… the move could spark discontent in Bradford’s UK channel.”

 

IT-Security-Journal-logo
IT Security Journal | Kim Borg | June 2014
ForeScout CounterACT network security solution Pioneer chose to implement allowed them to gain intelligence, establish continuous monitoring, apply specific policies at both the client and network levels, and enhance control integration among different tools… that is where this is all heading as part of a more integrated intelligence and control architecture.”

 

CSO Resource for Security
CSO | David Geer | June 2014
“A new BYOD protection approach combines ForeScout’s CounterACT NAC technology with Invincea’s FreeSpace containerization technology in order to better protect corporate data. In this partnership, ForeScout offers what it describes as a control fabric for security and an architecture- and process- based approach to protecting BYOD, based on industry standards rather than isolated proprietary technologies. The control fabric works in tandem with network junctions such as firewalls and switches, where it collects data and controls / initiates the network’s response to attacks and infections.”

 

HigherEdTech
HigherED Tech Decisions | Emily Underwood | May 2014
“Rollins College…recently made the switch to ForeScout CounterACT, a Network Access Control (NAC) solution that gives them a great deal of insight into and control over the devices on the school’s network…CounterACT is a network security appliance that dynamically identifies, discovers, classifies, inspects and applies policy to any device touching the network”

 

American Bnaker
American Banker | Penny Crosman | May 2014
“Banking regulators have been warning banks for more than a year to beef up their cyberdefenses as attacks on financial institutions become more frequent, sophisticated and widespread…Bank Leumi USA has been making a concerted effort to strengthen its cyber defenses since 2011..The bank recently deployed technology from Invincea and Forescout that it will use to collect threat information and feed it into a network access controller that acts as a security guard for the bank’s network.”

 

 

Latest Press Releases

June 3, 2014
ForeScout CounterACT Increases Visibility, Control and Compliance at Broward College
“Broward College selected the ForeScout CounterACT™ platform to secure and manage the personally- and college-owned devices connecting to its network…with more than 68,000 students located at four campuses and seven satellite locations in South Florida…Broward’s IT team aimed to invest in technologies that would facilitate a flexible, secure bring your own device (BYOD) strategy for its faculty, staff and students to facilitate learning.”

May 22, 2014
ForeScout CounterACT Wins Gold in 2014 Govies Government Security Awards
“The awards recognize the outstanding solutions that address security challenges in government agencies…ForeScout CounterACT provides government agencies with an automated solution to more efficiently control network access and enforce essential security controls.”
April 23, 2014
ForeScout Delivers New Package to Expedite UK Government Agency Compliance with the Public Services Network Initiative
“The compliance package combines the ForeScout CounterACT solution, services and pricing incentives for government authorities in the UK in order to secure unmanaged devices, preempt rogue device and unsanctioned application risks, and support compliance to PSN requirements…ForeScout CounterACT addresses these challenges by leveraging CounterACT’s built-in ability to see, monitor and control what is happening on your network – across users, devices, and applications.”
April 16, 2014
ForeScout CounterACT Receives “IAIT Tested and Recommended” Rating
“ForeScout CounterACT 7 is a next-generation network access control (NAC) solution that enables companies to continuously monitor and mitigate security exposures and cyberthreats…IAIT, an independent testing laboratory based in Germany, examined CounterACT under great scrutiny with a practical test that integrated the appliance into a corporate network; engaged discovery and monitoring services; designed policies for classification, rogue detection and blocking, guest and mobile device management, and endpoint compliance and remediation; and conducted third-party system integration.”

Latest Webcast

ForeScout_email-logo

Description: An interactive webinar that will examine recent cyber defense research and explore the real-world application of next-gen NAC to enable pervasive network security.

The session is led by the book’s author Steve Piper, CEO of CyberEdge, and contributor Scott Gordon, CMO, ForeScout, who will be joined by Morris Altman, Director of Network Services, Internet Security Officer at Queens College of CUNY.

  • Learn why NAC is in resurgence and what platforms offer
  • Get a feel for selection and deployment do’s, don’t and gotcha’s
  • See how to move to a continuous monitoring and mitigation stance

 

infosecurity1
With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to
corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen?

Description:

  • How do you know what devices are accessing your network?
  • How do you detect a rogue device?
  • What can you do to prevent a threat in your network and minimize the risk?

Phil Hochmuth, security program analyst at IDC
Scott Gordon, chief marketing officer at ForeScout
This webinar examines BYOD trends and risks, the mobile security landscape, policy development and control options. The session will also present a tiered service approach to enterprise mobile security where complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.
Topics Include:

  • Real-world issues, considerations and operational impact
  • Policy development processes to tolerate, support or embrace BYOD
  • Why combine NAC, MDM and other technical controls
  • How to devise tiered security service strategy

 

- Diana Kelly – IANS Faulty Advisory and Founder, SecurityCurve
- Jeff Bradberry – IT Security Manager, BrightPoint
To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement tools that apply and support multiple specifications across difference compliance requisites.  Network Access Control (NAC) supports numerous critical security and protection functions across multiple mandates. This interactive expert / user session, led by IANS faculty advisor Diana Kelly of Security curve with end user participant Jeff Bradberry of BrightPoint, will examine NAC and real-world compliance use cases.  Attendees will discover:
  • Key NAC functions that apply to compliance processes and specifications
  • Real-world use cases; considerations, controls, activities and processes
  • How NAC specifically maps to top commercial, regulatory and federal mandates

 

Latest Case Studies

nottingham-logo

Trent University deployed ForeScout CounterACT across its three campuses in January 2013 and expanded its deployment at the main city site over the winter to cater to the university’s ever-increasing number of BYOD endpoints.

 

SAP-ss-logo
SAP has about 50,000 to 60,000 employees and all of them have mobile devices… that means mobile phones, but also Linux and Windows machines, Macs, IP phones, printers, the projectors in the conference rooms and our switches. So SAP set out to do something about that for its own internal operations, with a security integration with the ForeScout CounterACT network security platform.

 

Omnicom Media Group Taps ForeScout CounterACT to Reduce Risks and Improve Security for 38 Offices and 5,500 Employees Across EMEA
The objective for OMG’s deployment of the CounterACT™ platform is to have complete, policy-based visibility with regards to who and what is on its network and to proactively protect network resources. ForeScout CounterACT helps OMG reduce and manage risk via a simple to install appliance that offers an agentless approach and flexible policy that preserves the user experience.

See More Case Studies»

Latest Videos/Podcasts

esg_logo
Jon Oltsik, Sr. principal analyst for Enterprise Strategy Group, discusses endpoint visibility, access and security (EVAS) and ForeScout’s position.

mediaresourcepage12
Gord Boyce, CEO of ForeScout, on ControlFabric platform
Gord Boyce, CEO, ForeScout, discusses the ForeScout ControlFabric platform in this short video. The ControlFabric™ platform is an open platform that enables ForeScout CounterACT and other IT solutions to exchange information and mitigate a wide variety of network and endpoint security concerns.

 

Drew Amorosi, deputy editor of InfoSecurity, interviews Scott Gordon, Chief Marketing Officer at ForeScout, at InfoSecurity Europe 2013 about BYOD and NAC. (7 min.).

 

Latest Research

frost_and_sullivan_logo

Traditional “defense-in-depth” strategy alone is not enough to effectively hinder hackers, mitigate violations and respond quickly enough to contain malware.  This silo approach results in mounting security blind spots that present opportunities for violations, threats and attacks.  The consequences can range from distracting to catastrophic impact.  Put simply: enterprise IT organizations have incomplete knowledge of who or what is accessing or operating on their networks; nor do they have efficient means to enforce endpoint integrity or contain exposures. After years of protecting organizations’ networks from unauthorized access and malware and deploying numerous host-based defenses, Next-Generation Network Access Control (NAC) is fast developing a reputation as an indispensable security platform that offers a wealth of functionality predicated on the importance of dynamic endpoint intelligence and policy based remediation.   This report examines in-depth how next-generation NAC technology enables continuous monitoring and advanced protection.

Click here for full report

The traditional enterprise perimeter is becoming more open and extended as the number of mobile and remote employees increases. The use of consumer mobile devices (such as smartphones and tablets) and the increased use of cloud services (individual tools such as Dropbox or business cloud applications such as Amazon Web Services) also challenge enterprise information security and IT risk management professionals. Organizations that leave networks wide open to employees’ mobile devices will have a hard time containing access to and controlling the use of sensitive corporate data in today’s extended computing environment.  Conversely, enterprises that either lock down these devices or lock them out by configuring networks to offer them limited services are missing an opportunity to make employees more accessible, more productive, and more satisfied with their work environments.  During the past 12 months, IDC has increasingly seen “hybridized” or joint NAC and MDM offerings whereby more progressive NAC vendors are integrating or offering their network-based security with MDM device-based security and vice versa.  The hybrid approach preserves an often-required separation of duties between network/application and security operations while preserving the value for the security operator to see and manage all devices in one console.  This report provide a pragmatic approach towards planning a BYOD security strategy that takes into account tiered levels of access, privileges, and controls, and looks at solutions that span network, device, user, application, and data controls and offer both on-premise and cloud architectures.

 

ESG Report: The Endpoint Visibility, Access, and Security (EVAS) Market: The Evolution of Network Access Control (NAC)

Emerging in 2010, NAC began to occupy a valuable piece of real estate on more extended and open networks.  NAC was in the right position to inspect devices, monitor activities, and enforce endpoint compliance policies in a growing number of use cases.  The combination of new enterprise needs and vendor research and development greatly expanded the purview and role of NAC technology.  As NAC enters its second decade, it has evolved beyond its original network access traffic cop role and now provides far greater functionality.  As this continues, ESG believes that NAC is evolving beyond its original limited market into a new segment called Endpoint Visibility, Access, and Security (EVAS). ESG defines EVAS as: Network security technologies that provide policy-based intelligence, enforcement, and mitigation of all network device access, configuration, and activities for any node attached to an IP network

 

 

Latest Recognitions

“For the third consecutive year ForeScout CounterACT was named by Gartner Inc. as a leader in its 2013 Magic Quadrant report for Network Access Control (NAC). ForeScout NAC innovations which includes its CounterACT platform and ControlFabric architecture also serve as the cornerstone technology addressing visibility, BYOD and continuous compliance trends.”


Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security

ForeScout demonstrated visionary leadership to enhance network security  manageability with the introduction of ControlFabric architecture, demonstrating that the company ‘gets it.’ ControlFabric technology provides essential bi-directional interfaces and protocols for ‘visibility, intelligence, and remediation’ across multiple network, security, and management tool sets. Extending the CounterACT platform with ControlFabric enables network security vendors to work together and  cooperate to make network security easier for security professionals to  achieve continuous monitoring and mitigation capabilities.

Click here for full report

sc_uk_logo

“The big new thing from ForeScout this year is API and its new program/ecosystem. The company has written 66 integrations now and expects many other third-party vendors to join…Add to this a clear focus  on bring-your-own-device (BYOD) and the idea of pervasive security throughout the enterprise and you have forward-looking thinking. ForeScout has traditionally been a NAC powerhouse. The experience and creativity that took it there has taken the company to the next levelwith the innovations of the past year”

Click here for full report

Latest Reviews

IAIT-tested_header
IAIT |April 2014
“IAIT, an independent testing laboratory based in Germany, examined CounterACT under great scrutiny with a practical test that integrated the appliance into a corporate network; engaged discovery and monitoring services; designed policies for classification, rogue detection and blocking, guest and mobile device management, and endpoint compliance and remediation; and conducted third-party system integration.”

 

sc_uk_logo
SC Magazine | October 2013
“In preparation for our installation, ForeScout provided a hardware appliance (the CT 100 model) and a large amount of easy-to-read documentation. From unpacking the appliance to getting the system up and operational, it took under 30 minutes to start tracking data… This was a pleasing experience from beginning to end. Best Buy.”

 

network_computing_uk
Network Computing | June 2013
“The phenomenal growth of BYOD (bring your own device) is fuelling increased interest in Network Access Control (NAC) as businesses expand their mobile workforce. ForeScout is a leader in this market for good reason because its CounterACT solution has benefited from continuous development, allowing it to stay ahead of the latest threats… ForeScout has innovatively moved NAC beyond traditional access control, offering businesses complete flexibility concerning the use of a wide range of computing devices and what they can do. Along with simplified deployment this latest version delivers a wealth of new features that will enhance flexibility for users and increase control for businesses in equal measure.”

 

Tolly Group
“Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. The complete 24-page report can be downloaded at http://www2.forescout.com/tolly_report.”