In the News

pro_security_zone_logo

Pro Security Zone | Jonathan Newell | September 2014
Integrated network defence system set to court Europe Read more

“The need for ForeScout to move into Europe became clear with the results of IDG research into the state of cyber defence maturity which showed that 96% of companies had experienced at least one significant security incident during the last 12 months and almost 40% has experienced two or more in the same period. With security management becoming ever more challenging and three-fifths of companies lacking network and endpoint visibility, there is a clear threat that is begging for greater levels of protection.”

American Bnaker

EdTech Magazine | D. Frank Smith | September 2014
Students Study a Rampant Virus at University Cybersecurity Lab

“The results of the survey analysts at IDG Connect conducted for ForeScout found that the education sector struggled the most with managing the security of its virtual machines, an industry that has experienced massive growth. The largest areas of vulnerability listed included malware as well as application and wireless security.”

American Bnaker

American Banker | Penny Crosman | September 2014
How This Small Bank Kicks Cybercriminals Off Its Network

“Bremer Bank deployed network access control software prepackaged into a server — known as ForeScout Technologies’ CounterACT appliance — to control who can use its network and protect the endpoints.”

networkworld
NetworkWorld | Jon Oltsik | September 2014
Network Security Challenges in the Enterprise“ESG Analyst, Jon Oltsik reports that 39 percent of organizations say that, “IT initiatives are being adopted without the proper network security oversight or controls in place,” and regards ForeScout as a solution that offers the security to mitigate this risk.”

 

Tech Target - logo image
TechTarget | Gina Narcisi | August 2014
ForeScout CounterACT improves NAC, endpoint security for Midwest bank“ForeScout has given Bremer Bank the ability to dynamically see all the known users, devices and applications on our network with a tremendous amount of detail and the means to perform actions in a single pane of glass.”

 

pro_security_zone_logo
PRO Security Zone | Jonathan Newell | August 2014
Becoming PSN compliant with Network Access Control“Once ForeScout’s network security product had been installed, Gloucestershire County Council and Capita were able to gain instant, real world network visibility, showing all aspects of the network and all devices that are attached to it. It also provided insight into operating systems interacting with the network environment which in some cases hadn’t earlier been understood to exist. Examples include 3rd party applications that had been allowed access to the network and represented a vulnerability.”

 

Bank Systems & Technology
Bank Systems & Technology | Jonathan Camhi | August 2014
Securing Networks in a BYOD-enabled Environment

“Banks are asking employees to do more with less now as they try to cut operating costs, and bring-your-own-device policies can enable employees to be far more productive. But the threat of data breaches looms large over the industry, and more employee devices connected to a bank’s internal network inevitably increases vulnerabilities, making access control pivotal for any bank considering a BYOD policy.

For St. Paul, Minn.-based Bremer Bank (with $8.7 billion in assets) finding the right balance between network security and enabling employee productivity with BYOD had been a major challenge prior to its implementation of ForeScout CounterAct for network access control in 2012.”

 

help net security
Help Net Security | Zeljka Zorz | August 2014
Keeping College Networks Secure

“Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the third largest university system in the US in terms of enrollment, with a faculty and staff of 5,000 and student population of nearly 20,000.

In this interview he talks about his job, the biggest challenges and threats his team faces, exchanging knowledge, and more.”

 

buzz-logo
Information Security Buzz | ForeScout | August 2014
ForeScout Expands ControlFabric ITSEC Ecosytem with Rapid7 and ThreatStream
“At Black Hat, ForeScout Technologies announced new ControlFabric integrations with Rapid7 Nexpose and ThreatStream.”

 

globalsecmag-logo
Global Security Mag | Marc Jacob | August 2014
Bremer Bank Selects ForeScout CounterACT for Real-time Visibility, Guest Access and Control Automation
“ForeScout Technologies, Inc. announced that Bremer Financial Corporation has successfully deployed ForeScout CounterACT™. ForeScout’s agentless approach enabled the bank to migrate off of its existing 802.1X infrastructure and provides comprehensive, real-time network visibility across all endpoints, resulting in improved compliance with security policies without negatively impacting user experience or productivity.”

 

globalbanking-logo
Global Banking & Finance Review | August 2014
ForeScout and ThreatStream Partner to Combine Threat Intelligence and Dynamic Mitigation of Cyber Attacks
“ForeScout Technologies, Inc., the leading provider of pervasive network security solutions, and ThreatStream, a next generation cyber intelligence company that enables the disruption of cyber attacks in real-time, announced a partnership and plans to enable the ThreatStream OPTIC™ platform to interoperate with ForeScout’s CounterACT™ Platform.”

 

pro_security_zone_logo
Pro Security Zone | August 2014
Bremer Bank improves user security and satisfaction with CounterACT
“ForeScout CounterACT is being used in the Bremer Financial Corporation providing the company with comprehensive, real-time network visibility across all of its endpoints with a resulting improvement in security policy compliance with no negative impacts on user experience or productivity. The agentless approach used by ForeScout also gave the bank the ability to move away from its existing 802.1x infrastructure.”

 

databreach-logo
Data Breach Today | Megan Goldschmidt | August 2014
Industry News: Codenomicon Launches CodeVerify
“ForeScout Technologies is integrating its CounterACT program with ThreatStream’s OPTIC platform. The combined solution will give organizations the ability to leverage global threat information with network security intelligence.”

 

mobilemarket-logo
Mobile Market Portal | Melissa Warten | August 2014
ForeScout and ThreatStream Team Up
“Two is better than one—and when it comes to business security, a trusted partnership can serve much more effectively than going it alone. ForeScout and ThreatStream have come together in the hopes of proving that mindset.”

 

infotech-logo
Infotech Spotlight | Jyothi Shanbhag | August 2014
Bremer Financial Corporation Installs ForeScout CounterACT
“In order to keep track of what is taking place on the network at all times, it requires a platform that provides real-time visibility of the devices, applications and users that are connected. ForeScout Technologies, provider of pervasive network security solutions, delivers such visibility with its CounterACT solution.”

 

infosecurity
InfoSecurity | Drew Amorosi | July 2014
Q&A: Ken Pfeil, CISO, Pioneer Investments
“What we are able to leverage from a technology perspective is pretty phenomenal. Take, for example, this whole integration with [ForeScout] CounterAct – I have not seen it done anywhere else in the industry, and I have been doing this for over 25 years. I have not seen this level of integration.”

 

wallstreet-journal
The Wall Street Journal | Ben DiPietro | July 2014
Survey Roundup: Disconnect Between Regulators, Banks
“Cross-Industry Security Look: A survey of 1,600 IT security executives from five countries by IDG Connect and ForeScout Technologies looked at the nature and extent of security threats and defense maturity of companies in the finance, manufacturing, health-care, education and retail sectors. It found the health-care sector was more likely to experience higher-than-average compliance policy violations, while the manufacturing, education and finance sectors appear more prone to phishing attacks.”

 

business-insurance-logo
Business Insurance | Staff | July 2014
Study shows 96% of organizations experienced significant security incident
“A report by ForeScout Technologies found that 96% of firms in the United States, the United Kingdom and DACH countries (Germany, Austria and Switzerland) experienced a serious IT security incident in the past year, Infosecurity reported.”

 

Canadian-underwriter-logo
Canadian Underwriter l Staff l July 2014
Almost all organizations in new survey experienced a significant IT security incident in the past year
“The overwhelming majority, 96%, of surveyed organizations spanning five industries in the United States and Europe experienced a significant IT security incident in the past year, notes a new report issued Wednesday by ForeScout Technologies Inc.”

 

hospitalCIO-logo
Becker’s Hospital CIO l Akanksha Jayanth l July 2014
Healthcare vs. The World: 5 Key Cybersecurity Findings
“Compared to four other key industries, the healthcare sector appears to be slightly behind in cyber defense maturity, according to a survey published by ForeScout Technologies and conducted by IDG Connect. “

 

mobihealthnews-logo
MobiHealthNews | Jonah Comstock | July 2014
Survey: Healthcare industry has the most trouble with mobile device security
“Healthcare is falling behind other industries in prioritizing and attending to security concerns, according to a new report from security company ForeScout based on a survey conducted by IDG Connect.”

 

politico-logo
Politico | Joseph Marks | July 2014
Morning Cybersecurity
“96 percent of organizations experienced a significant IT security incident in the past year, according to a survey of 1,600 IT professionals at companies with more than 500 employees.”

 

fiercesmartguide-logo
FierceSmartGrid | Barbara Vergetis Lundin | July 2014
Threats to energy IT no different than other industries
“After interviewing 1,600 IT information security decision makers in organizations with more than 500 employees, spanning five industries in the U.S. and Europe, ForeScout Technologies, with the independent research conducted by IDG Connect, has found that more than 96 percent of organizations experienced a significant IT security incident in the past year.”

 

healthitsecurity
HealthITSecurity | Patrick Ouellette | July 2014
Survey reviews IT security threats: Healthcare results
“A recent IDG Connect and ForeScout survey, titled the State of IT Cyber Defense Maturity Report, reviewed the different security threats posed against finance, manufacturing, healthcare, retail and education organizations across the world.”

 

InsideHigherEd-logo
Inside Higher ED | Staff | July 2014
Confidence About Cybersecurity Lags in Academe
“Academe may be less prepared than the finance, health care and manufacturing sectors to tackle cybersecurity breaches, according to a report from the network security provider ForeScout Technologies, Inc.”

 

infosecurity
InfoSecurity | Staff | July 2014
96% of Organizations Experienced a Serious Security Incident in the Past Year
“Security events have gone from pervasive to near-ubiquitous: The ForeScout Technologies 2014 Cyber Defence Maturity Report shows that 96% of organizations experienced a significant IT security incident in the past year.”

 

security-week_logo
SecurityWeek | Brian Prince | July 2014
1 in 6 Say Their Organization Had At Least 5 Significant Security Incidents in Past Year: Survey
“A new report from ForeScout Technologies described a challenging world for IT security – one where one in six IT pros say their organization has had five or more significant security incidents in the past year.”

 

help net security
Help Net Security | Zeljka Zorz | July 2014
“The majority of IT organizations are aware that some of their security measures are immature or ineffective, but only 33 percent have high confidence that their organizations will improve their less mature security controls.”

 

FierceCIO
Fierce CIO | David Weldon | July 2014
“Broward College has had a BYOD program for a few years, but it lacked control over user accounts and critical security. A network access control solution from ForeScout helped it get a handle on its newly-discovered 20,000-plus users.”

 

infosecurity
Infosecurity | Drew Amorosi | July 2014
“Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community.”

 

logo_CRN
CRN | Doug Woodburn | July 2014
“The NAC area is growing rapidly and we are seeing great success with our NAC partner ForeScout… Bradford Networks has confirmed a support rejig at the security vendor will leave it with no direct UK presence… the move could spark discontent in Bradford’s UK channel.”

 

IT-Security-Journal-logo
IT Security Journal | Kim Borg | June 2014
“The ForeScout CounterACT network security solution Pioneer chose to implement allowed them to gain intelligence, establish continuous monitoring, apply specific policies at both the client and network levels, and enhance control integration among different tools… that is where this is all heading as part of a more integrated intelligence and control architecture.”

 

networkworld
Network World | Ellen Messmer | June 2014
“Monitoring is done through security gear, such as unified threat management gateways and network-access control, to enforce policy… ForeScout’s network-access control appliance is used on the Broward campus network to block some policy violations right as they occur. “

 

Tech Target - logo image
Tech Target | Gina Narcissi | June 2014
“Broward College in Broward County, Florida, knew it needed a better answer to bring your own device (BYOD) management to manage a network used by more than 68,000 students and 2,000 faculty and staff members located across four campuses and seven satellite locations in South Florida…Santill and his team selected ForeScout CounterACT for its agentless approach to network access control (NAC) and its ability to integrate with third-party security tools for better network visibility.”

 

help net security
Help Net Security | Zeljka Zorz | June 2014
“One of the challenges was to secure BYOD when it had already been the norm for students for years. We had to meet that security challenge without interrupting the current environment. We did this through a combination of ForeScout’s NAC solution…The biggest difference is going to be the large amount of unmanaged devices connecting to the network.We are meeting the challenge through technologies such as ForeScout’s NAC.”

 

CSO Resource for Security
CSO | David Geer | June 2014
“A new BYOD protection approach combines ForeScout’s CounterACT NAC technology with Invincea’s FreeSpace containerization technology in order to better protect corporate data. In this partnership, ForeScout offers what it describes as a control fabric for security and an architecture- and process- based approach to protecting BYOD, based on industry standards rather than isolated proprietary technologies. The control fabric works in tandem with network junctions such as firewalls and switches, where it collects data and controls / initiates the network’s response to attacks and infections.”

 

pro_security_zone_logo
Pro Security Zone | June 2014
“With 4 campus sites and a further 7 satellite locations supporting 68,000 students throughout Florida, Broward college was faced with a significant challenge in securing and management the large number and types of devices being connected to its network…To achieve this, the college turned to pervasive network security supplier ForeScout’s CounterACT platform for the security and management of all the devices connecting to the network, whether owned by the college itself or whether they are personal devices, something which it achieved without adverse effects on the end user experience.”

 

networkworld
Network World | Jon Oltsik | June 2014
“Alternative endpoint monitoring weaknesses can be related to limited visibility around mobile devices, but think about mobile device use in the context of other devices for each user and it gets to be a pretty complex monitoring challenge. This is where vendors like …ForeScout… are adding value.”

 

GBFR
Global Banking and Finance Review | June 2014
“John Pescatore, director of emerging security trends at SANS Institute, and Ken Pfeil, chief information security officer at Pioneer Investments, will participate in a new webinar to discuss what works in continuous monitoring and mitigation…the online seminar will examine drivers, considerations, implementation and results with regards to advancing security intelligence and threat response.”

 

pro_security_zone_logo
Pro Security Zone | June 2014
“A case study on continuous monitoring and mitigation at Pioneer Investments is the subject of a webinar hosted by the SANS Institute and sponsored by pervasive network security solution provider, ForeScout Technologies…The core of a next-generation security protection process will be continuous, pervasive monitoring and visibility that are constantly analysed for indications of compromise, according to a recent Gartner report.”

 

allaboutsecurity-logo
All About Security | June 2014
“To meet the need for extensive coordination between IT management and automation systems as well as complete visibility and real-time rating, ForeScout has developed the ControlFabric technology. ForeScout ControlFabric is an open technology to exchange information on ForeScout CounterACT and other IT solutions and can defuse a wide range of security problems in networks and endpoints. The technology helps companies using data infrastructure to raise situational awareness and policy-based controls to accelerate repair measures to improve the security status.”

 

networkworld
Network World | Ellen Messmer | May 2014
“Heartbleed, which would let a savvy attacker capture passwords or digital certificates…ForeScout… helped banking customers by analyzing the products they used in their networks for vulnerable OpenSSL.”

 

American Bnaker
American Banker | Penny Crosman | May 2014
“Banking regulators have been warning banks for more than a year to beef up their cyberdefenses as attacks on financial institutions become more frequent, sophisticated and widespread…Bank Leumi USA has been making a concerted effort to strengthen its cyber defenses since 2011..The bank recently deployed technology from Invincea and Forescout that it will use to collect threat information and feed it into a network access controller that acts as a security guard for the bank’s network.”

 

ZoneLogo
Pro Health Service | Jonathan Newell| May 2014
“Microsoft announced the impending withdrawal of support for its Windows XP operating system in 2012 and the promised cessation happened in April this year, leaving some companies open to vulnerabilities that wouldn’t be fixed by the software giant…the healthcare industry is cited as one group of IT users which is likely to be hit by the withdrawal of Microsoft’s support. The reason for this is past installations of equipment that runs on programs created for the Windows XP operating system.”

 

HigherEdTech
HigherED Tech Decisions | Emily Underwood | May 2014
“Rollins College…recently made the switch to ForeScout CounterACT, a Network Access Control (NAC) solution that gives them a great deal of insight into and control over the devices on the school’s network…CounterACT is a network security appliance that dynamically identifies, discovers, classifies, inspects and applies policy to any device touching the network”

 

pro_security_zone_logo
Pro Security Zone | Jonathan Newell| May 2014
“ForeScout and Invincea have partnered to integrate user device protection technology and the CounterACT enterprise network protection platform…From an end-user perspective, Chris Walsh of Bank Leumi USA…rely on ForeScout to gain visibility and enforce policy for users and devices connecting to our network – including home-use devices and BYOD.”

 

BCW
BCW | May 2014
“Agentless next-generation network access control (NAC) solutions can provide real-time visibility of endpoints connected to your network, including all XP systems, as well as information about where they are and who is logged in.”

 

pro_security_zone_logo
Pro Security Zone | Jonathan Newell| May 2014
“Despite a long period of notice and the inevitability of the withdrawal of support from Microsoft for its Windows XP operating system, there is still a large inventory of computers in organisations across the world which are continuing to run the old version of Windows that has now been superceded no less than three times…Whatever the reason, steps need to be taken in order to protect operations and reduce the vulnerability of other devices attached to the same network”

 

sc_uk_logo
SC Magazine | Greg Masters | April 2014
“A secure network with no disruption to users and service is essential for the operations of any enterprise, but owing to its time-critical nature perhaps nowhere is it as vital than in the health care industry. Additionally, taking a device offline in a hospital setting can literally put a person’s life at risk, so this adds a level of complexity to securing the network…The center already used tools from Bradford, Cisco and ForeScout and found Bradford and Cisco not compatible with its new needs…ForeScout CounterACT’s agentless approach was key.”

 

cbrnews
CBR | Duncan McRae | April 2014
“With more than 25,000 students and 2,500 staff spread across three campuses, NTU’s wireless network accommodates about 6,000 active wireless endpoints — and 10,000 “seen” endpoints — figures that grow continually as students bring more of their own devices (BYOD), including laptops, smartphones, tablets and gaming devices, onto the network…After implementing CounterACT, calls to the IT helpdesk were reduced, which has contributed to cost-savings for NTU. “

 

Tech Target - logo image
Tech Target | Gina Narcisi | April 2014
“Many NAC vendors are helping enterprises by evolving the scope of NAC functionality…Many modern agentless NAC strategies — like ForeScout’s — can also adapt to an enterprise’s infrastructure or even hosted security services more easily when compared to legacy NAC technology, which needed to touch every part of the infrastructure with agents to have enough visibility”

 

pro_security_zone_logo
Pro Security Zone | April 2014
“A PSN compliance package is now available from ForeScout for the UK public sector featuring unmanaged device security, the mitigation of rogue device and unsanctioned application risk and the provision of network monitoring and control…By using CounterACT…central agencies and local councils are able to become and remain compliant to PSN security provisions, to support other security guidelines such as those found in ISO-27001 and PCI-DSS, and to generally reduce cyber attack risks.”

 

Security Insider
Security Insider | April 2014
“…excellent functionality and intuitive operator guidance in our tests… very powerful policies, which can be used efficiently for full protection and proactive safeguarding of all services and components in company networks… enables administrators to create a central point for security management in their environment. We award ForeScout CounterACT IAIT Tested and Recommended.”

 

UKAuthoritynews
UK Authority | April 2014
“Under the PSN rules, organisations must demonstrate that unmanaged devices cannot gain access to a PSN-connected system…If CounterACT detects an unmanaged device, the platform automatically reduces its access to the network via a virtual firewall so that organisations remain compliant with PSN’s Code of Connection (CoCo), the PSN security standards.”

 

network_computing_uk
Network Computing | April 2014
“Successful organisations are progressing their techniques and their tool arsenal including the use of next-generation network access control…Enterprises are becoming more complex and the threat landscape is evolving rapidly. Network security has to be pervasive and continuous which requires IT teams to better leverage security tool interoperability and policy-based automation.”

 

GCN_logo
GCN | William Jackson | April 2014
“ForeScout’s solution for data sharing within the enterprise is ControlFabric, a set of technologies that lets the company’s CounterACT endpoint control tool interact with other IT security products on the network. It not only allows management and enforcement of security policy on endpoint devices on the network, but helps enable continuous monitoring and mitigation through products already in place.”

 

Digitalbydefault
Digital By Default | Saleha Riaz | April 2014
“ForeScout’s solution enables central agencies and local councils to meet and remain compliant to PSN…an initiative to unify the network infrastructure across the UK public sector into an interconnected “network of networks” and to realise greater ICT service economies.”

 

TMCNet black white
TMC Net | Shamila Janakiraman  | April 2014
“Using the company’s pervasive network security solutions, organizations can continuously monitor and mitigate security exposures and cyber-attacks…pecial emphasis is given to next-gen NAC technology along with the capabilities of next-gen NAC solutions. Deployment considerations including processes, technologies and techniques involved with NAC solutions are highlighted.”

CSO Resource for Security

CSO | Maria Korolov | April 2014
“Routers and switches don’t do a particularly good job identifying what’s connected to them, he says, especially devices that only connect intermittently…
To deal with this issue, Pioneer Investments uses tools from security firm ForeScout Technologies, which can identify and manage network connections and even monitor them for suspicious or unusual activity.”

 

networkworld
Network World| Ann Bednarz | April 2014
““Gives us the ability to automatically detect and isolate compromised devices from the network. Plus it is non-disruptive and provides end user-friendly guest networking capabilities… we see a direct return on investment in IT man-hours due to ease of management and a decrease in help desk calls.””

 

TMCNet black white
TMC Net | Nathesh | April 2014
“Using the ForeScout CounterACT solution, the Nottingham Trent University is hoping to monitor and mitigate security risks from devices accessing its wireless network and also deliver end-user ease of use…NTU will use of ForeScout CounterACT; an automated security control platform that lets the university to see, monitor, and control all users, operating systems and devices.”

 

techworld
Tech World | John Dunn | March 2014
“Nottingham Trent University (NTU) has completed the installation of Forescout’s network access control platform as part of a long-running plan to rationalise, upgrade and secure its once-sprawling Wi-Fi network…The new CounterACT NAC system will allow the University’s 25,000 students and 2,500 staff to use Wi-Fi across its three campuses in the city, avoiding the old system’s inconvenient and much complained about requirement that an agent be run on each endpoint.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | March 2014
” How can human teams keep up with threats streaming in from a proliferation of endpoints both inside and outside the corporate perimeter? Network Access Control (NAC) market leader ForeScout and advanced threat protection vendor Damballa aim to solve the problem with a partnership announced today…Additionally, the ForeScout/Damballa integration will enable the collection of additional threat intelligence as malware is detected and can analyze malware traces on compromised devices, then use that intelligence…to discover additional devices that were also infected and take steps to remediate those, too.”

 

1488.eweek_logo2
eWeek | Sean Kerner | March 2014
“(ForeScout) is going to help with the transition away from the traditional client architecture and also the transition that’s happening in the datacenter… ForeScout is at the nexus of the client and datacenter architecture…. Clearly I believe they will be in the next set of big market leaders.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
“Nottingham Trent University (NTU) will monitor and mitigate security risks from devices connecting to its wireless network whilst at the same time maintaining ease of use for end users by deploying CounterACT from ForeScout Technologies…After implementing CounterACT, calls to the IT helpdesk were reduced, which has contributed to cost-savings for NTU.”

 

searchsecurity
Search Security | Brandan Blevins | March 2014
“Damballa last week announced integration between its Failsafe product and the technology of Campbell, Calif.-based network security vendor ForeScout, perhaps best known for its network access control product, a move that Foster said will reduce the resources needed to manually handle alerts.”

 

logo_CRN
CRN | Rob Wright | March 2014
“Network security vendor ForeScout Technologies named new vice presidents last month, starting with Paul Phillips, who was appointed as senior vice president of corporate and business development…Darren Milliken as senior vice president, general counsel and corporate compliance officer.”

 

SF Gate
SF Gate | Jillian Sullivan | March 2014
“ForeScout added Paul Phillips as senior vice president of corporate and business development; and Darren Milliken as senior vice president, general counsel and corporate compliance officer.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
“ForeScout forms technology partnership with Damballa to provide automatic breach detection and mitigation of advanced threats…The integration of Damballa’s Failsafe technology with ForeScout’s CounterACT platform will increase visibility of advanced threats and enable automatic remediation across enterprise networks thereby releasing human resources enabling them to keep up with advanced threats.”

 

GBFR
Global Banking and Finance | March 2014
Administrators of security technologies need tools that simplify and automate the task of managing security…ForeScout Technologies has received the Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security…based on ForeScout CounterACT and its advanced ControlFabric architecture…ForeScout’s CounterACT platform, which provides visibility, control and mitigation, and its ControlFabric architecture, which enables interoperability between network and security infrastructure, deliver such network security innovation today.”

 

BCW
BCW | March 2014
“A ’2014 Cyberthreat Defence Report’ by CyberEdge Group was underwritten by nine firms across the network security world and revealed that network access control (NAC) was rated the most effective security technology in defending against cyber threats…To address common security challenges, many organisations are now supplementing their existing security products with pervasive network security technologies, like NAC, to dynamically view and control user, device, application and access diversity.”

 

All About Security
All About Security | March 2014
“At the heart of each viewpoint, everyone would agree that continuous monitoring starts with visibility. Whether you are monitoring a global class enterprise or a single set of systems that make up a primary application, visibility is paramount…The key is to automate the gathering of data, and with advancements in today’s technologies, inventories can be automatically established and updated in real time.”

 

TMCNet black white
TMC Net | Michelle Amodio | March 2014
“ForeScout Technologies saw two new executives enter its workforce as it grows as a network security provider…The company welcomed Paul Phillips and Darren Milliken, who bring various talents and leadership skills, including business development, compliance and counsel.”

 

logo_main
Channel Partner | Karl-Erich Weber| March 2014
“ForeScout Technologies has expanded its management team with two new executives: Paul Phillips, Senior VP business development; and Darren Milliken, Senior VP, general counsel and compliance officer.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
“ForeScout Technologies has received the 2014 award for “Global Technology Leadership Innovation in Network Security” from Frost & Sullivan…Based on ForeScout CounterACT and its advanced ControlFabric architecture, the award recognises the company’s focus on enhancing customer value, which has resulted in improved customer retention and, ultimately, increased market potential.”

 

infosecurity1
Infosecurity | Eleanor Dallaway | February 2014
“I look at the mega trends in the market place…consider disruptions and who will be the new winners. Team and leadership are also important to me, and finally market demand…Palo Alto was the company of 2012, FireEye the company of 2013, and ForeScout will be the company of 2014…ForeScout has the leadership role in the network space, and they make it about the eco-system of partners. I’m thrilled to be a part of it”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | February 2014
“Both BYOD and the increasing mobility of enterprise workforces introduce new uncertainties and additional threats to distributed data environments, often requiring new solutions to ensure compliance…CounterACT RemoteControl aims to fill in the compliance gaps by providing continuous visibility and policy enforcement of both corporate and personally owned devices, even when off the enterprise network…”

 

pro_security_zone_logo
Pro Security Zone | Jonathan Newell | February 2014
“Nearly 33% of the workforce would be working remotely by 2015… and are not necessarily always plugged into the network controlled by the company that they work for. RemoteControl is part of the CounterACT system but the appliance is outside the corporate firewall…automatically reflects the policy settings of CounterACT… maintaining a compliant posture at all times when connected to any network, the device is less likely to encounter problems when next connecting to the corporate network.”

 

Sanabria
451 Research | Adrian Sanabria | February 2014
“ForeScout is known for NAC, even though 40% of its customers don’t buy CounterACT for policy enforcement. Learn more about how Vistaprint found success with the product in an area it didn’t originally anticipate.”

 

TMCNet black white
TMC Net | Shamila Janakiraman | February 2014
“It has become imperative for businesses to provide an extended enterprise network so that employees can securely access corporate networks and hosted corporate resources…ForeScout Technologies, a specialist in pervasive network security solutions, plans to launch CounterACT RemoteControl, a solution that will help IT organizations implement a policy to remotely monitor corporate and personally owned devices.”

 

Computerworld
Computerworld | Jaikumar Vijayan | February 2014
“RSA says 400 vendors registered for the event. I believe them. Intel appears to have one of the largest booths, and it’s not even a security vendor, although it did acquire security company McAfee a few years ago. BeyondTrust’s booth has a high-striker for people to try out their strength, eSentire has a model elephant, ForeScout has a boxing ring with stunt boxers and CA has a booth that looks like the endoskeleton of a prehistoric creature. Germany has a booth.”

 

dark_reading_logo_small
Dark Reading | Kelly Higgins | February 2014
“Now the next-generation NAC is agentless, and any device can be evaluated. You also now have the choice of quarantining the device…The mobile threat is the main driver for this resurgence of interest in NAC…Gartner late last year pointed out how BYOD has injected new life into NAC.”

 

fcw-logo
FCW | Frank Konkel | February 2014
“The 2014 Cyberthreat Defense Report, a detailed study of 763 IT security decision makers and practitioners from large organizations in 11 countries. The report was completed by CyberEdge Group LLC and sponsored by ForeScout and eight other information security companies…The Cyberthreat Defense Report is a highly detailed analysis of the current security postures, perceptions, concerns and future plans of large organizations across 19 industries.”

 

networkworld
Network World | Ellen Messmer | February 2014
“CounterACT RemoteControl…Helps enterprises ensure remote employee and corporate-owned devices remain endpoint compliant when not attached to the corporate network, a highly sought after enterprise capability.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | February 2014
“Network access control (NAC) is rated highest of all the security technologies in its potential to defend against today’s cyber-threats, and 77 percent of IT professionals are using or plan to use NAC for mobile security…The survey also indicated NAC is the most often-used technology to detect vulnerabilities and security misconfigurations within transient laptops and mobile devices (51 percent), and NAC is the most often-used technology (53 percent of respondents) to detect host security misconfigurations.”

 

fierceIt
FierceIT Security | Fred Donovan| February 2014
“More than three-quarters of IT pros are using or planning to use network access control technology to improve mobile security…NAC received the highest mark in terms of the effectiveness of cyberthreat defense products with a score of 3.71 out of 5.”

 

ZoneLogo
Pro Health Service Zone | Jonathan Newell | February 2014
“ForeScout reviews the task of ensuring the IT infrastructure in medical facilities is secured in its entirety including connected instruments and devices…IT networks in hospitals, clinics and surgeries have some special characteristics that differentiate them from commercial networks with patient safety and confidentiality being at the top of the list of critical factors that network managers have to consider in ensuring the IT infrastructure is secure and reliable.”

 

InformationSecurityBuzz
Information Security Buzz | February 2014
“The percentage of organizations formally endorsing BYOD initiatives is expected to skyrocket from 31 percent in 2014 to 77 percent in 2016…Network access control (NAC) was rated the most effective security technology in defending against cyberthreats.”

 

healthitsecurity
HealthIT Security | Nicole Freeman | February 2014
“For many organizations, NAC provides additional security by controlling devices, applications, and users on a network. For healthcare providers using mobile devices or with a BYOD policy in place, being able to remove unwanted devices or users from a network is a simple step in security…NAC is an important weapon within many organizations’ arsenals and for good reason. Many of our respondents saw it as a versatile tool that could support protection efforts ranging from BYOD policy enforcement to configuration management.”

 

SYSBUS
Sysbus |Götz Güttich | February 2014
“Report indicates…77 percent of IT experts also see a compelling need for continuous monitoring and risk reduction, and more than 60 percent of the participants experienced in 2013 a privacy violation, with a quarter of all participants cites lack of investment by the employer in adequate defense measures as a factor…To face these challenges, many companies supplement their existing security investment by NAC of the next generation to be able to see and control dynamically with the aim of users, device, application and access diversity.”

 

TMCNet black white
TMC Net | Kasey Schefflin-Emrich | February 2014
“As cyber attacks are becoming more commonplace, Internet security is erupting into a much sought after business.To meet this increasing demand, network security solutions provider ForeScout Technologies has expanded its leadership team with the addition of three new executives…each possess key qualities that will help bolster the company for long-term success – experience, leadership, dynamic personality and a proven track record”

 

Itsecuritygurunews
IT Security Guru | Dan Raywood | February 2014
“The CDM initiative was intended to offer better visibility into threats and was deployed in the United States to enable Government departments to expand their continuous diagnostic capabilities by increasing their network sensor capacity, automating sensor collections and prioritising risk alerts…Of the 17 contractors in the US, 14 of them are using ForeScout CounterACT. They are there to put the tools in; it could be McAfee, Symantec or IBM solutions, but we are part of the tool portfolio “

 

GBFR
Global Banking  & Finance Review | February 2014
“Leading pervasive network security solutions provider, ForeScout, has announced that two new executives have joined the company – Paul Phillips, senior vice president, corporate and business development; and Darren Milliken, senior vice president, general counsel and corporate compliance officer.”

 

Whir
Wired Innovation Insights | David Hamilton | February 2014
” Also found that 77 percent of IT professionals use NAC or are planning to use it for mobile security…More than half (53 percent) of respondents said they use NAC to detect host security misconfigurations, and 51 percent use NAC to detect vulnerabilities and security misconfigurations in transient laptops and mobile devices.”

 

channelpro
Channel Pro Network | February 2014
“Network security specialist ForeScout Technologies Inc. has revealed plans for a monitoring solution that will provide its CounterACT platform users with an integrated means of monitoring mobile devices and enforcing security policies…Called CounterACT RemoteControl, the solution will “bolster endpoint security for devices both on and off the network”

 

SJMN
San Jose Mercury News| February 2014
“ForeScout has announced that two new executives have joined the company – Paul Phillips, senior vice president, corporate and business development; and Darren Milliken, senior vice president, general counsel and corporate compliance officer.”

 

GBFR
Global Banking and Finance Review | February 2014
“The results of the ‘2014 Cyberthreat Defence Report’ point to the wins, gaps and importance of advancing defensive strategies to enforce controls and pre-empt attacks. As such, many organisations are investing in automated techniques, including next-generation network access control (NAC).”

 

logo
Wired Innovation Insights | February 2014
“A recent survey conducted by Enterprise Strategy Group showed that 44 percent of enterprises said they wanted to move toward a more integrated security architecture in the next 24 months…Already, 25 IT security companies have joined the program that we call ControlFabric. ControlFabric is based on open APIs that make it possible for IT security managers, system integrators and product vendors to mix and match product connections and make it easier to automate security responses.”

 

All About Security
All About Security | February 2014
“To face these challenges, many companies supplement their existing security investment by NAC of the next generation to be able to see and control dynamically with the aim of users, device, application and access diversity…This bodes well for the CounterACT platform ForeScout. The new platform enables IT security products in the able to exchange information dynamically and enables companies to react faster to different safety and operational problems.

 

ComputerWelt
ComputerWelt | February 2014
“Now the next-generation NAC is agentless, and any device can be evaluated. You also now have the choice of quarantining the device…The mobile threat is the main driver for this resurgence of interest in NAC…Gartner late last year pointed out how BYOD has injected new life into NAC.”

 

datensicherheit.de
Datensicherheit.de | February 2014
“ForeScout Technologies expanded its management team with two new executives…Paul Phillips, Senior Vice President of Corporate and Business Development; and Darren Milliken, Senior Vice President, General Counsel andCorporate Compliance Officer.”

 

Campus Technology
Campus Technology | Kanoe Namahoe | January 2014
“Rollins College…used CounterACT to create a virtual firewall that allowed us to automatically notify users that their machine was compromised and to request they bring it to the help desk for remediation. This incident really opened my eyes to the power of CounterACT and its ability to enhance our security posture…Rollins College has been able to free up more than 100 man-hours of IT time per month.”

 

SVBJ
Silicon Valley Business Journal | Jon Xavier | January 2014
“Salem… thinks that the security industry is going through a fundamental shift, and the large incumbents are going to have a hard time keeping up….ForeScout is one of those companies that I think is moving IT forward. It’s the next generation of companies to bring the CSO and the IT team the opportunity to take control of the new environment.”

 

EMA-logo
EMA Reserch | David Monahan | January 2014
“I am impressed by ForeScout’s solutions for a couple of reasons.CounterACT has great scalability. It addresses the needs of SMEs, small to medium enterprises, as well as having some of the largest NAC deployments, some of which exceed 800,000 devices…ControlFabric provides accelerated remediation by enabling an information exchange to more efficiently mitigate a wide variety of network, security and operational issues. A key factor in an optimized layered security model is that all of the layers must work cooperatively to provide the desired stronger defense…With the combination of these features, ForeScout demonstrates its leadership in the NAC space, delivering a highly competitive and extensible solution set with CounterACT and ControlFabric.”

 

TMCNet black white
TMC Net | Doug Barney | January 2014
“Enrique Salem has no plans to rest on his laurels, but instead just picked up a new gig on the board of directors forForeScout Technologies. Salem should know the ForeScout ropes as it, like Symantec, is in the network security business. He is also no stranger to being on boards, having also served that role for FireEye (News – Alert), Netskope, Atlassian, DocuSign and Biba.”

 

infosecurity1
Infosecurity | January 2014
“For more effective endpoint and mobile security, it’s clear that IT security managers need a unified approach for consistent policy management, access control, compliance monitoring and reporting across all network tiers and endpoint devices. In the combined solution, ForeScout network access control (NAC) provides network visibility and control for IT managers; and SAP provides a way to implement and enforce mobile device policies.”

 

Itsecuritygurunews
IT Security Guru | Dan Raywood | January 2014
“Continuous monitoring is really about getting real-time visibility for everything that’s going on in your network. Additionally, it is about being able to share this context with other tools so that their policy engines can be enhanced with better context for their controls. Then allowing those tools to exchange information and even instruct tools such as our platform, CounterACT, to actually take dynamic mitigation for violations, exposures and threats. “

 

logo_CRN
CRN | Robert Westervelt | January 2014
“Large security vendors with massive portfolios are struggling to keep pace with the rapid changes taking place at the endpoint and in the data center, according to former Symantec CEO Enrique Salem…who sits on the boards of networking security vendors FireEye and Forescout and cloud analytics and security firm Netskope, said a variety of agile startups are in position to address the issues faced by enterprises dealing with mobility issues at the endpoint…”

 

TMCNet black white
TMCnet | Matt Paulson | January 2014
“Salem has been in executive leadership positions and has worked on business strategies for over 25 years, so his experienced input will be highly valued by the rest of the ForeScout board…When Interviewed about his new position, Salem said that ForeScout’s network security platform delivers the visibility, control and interoperability necessary to optimize IT resources and evolve defenses. “

 

SiliconValleySanJoseBusinessJournal.com_logo
SVBJ | January 2014
“Has been named to ForeScout Technologies, Inc. Board of Directors…ForeScout’s network security platform delivers the visibility, control and interoperability necessary to optimize IT resources and evolve defenses, and Salem looks forward to working with the members and contributing to the company’s success.”

 

SJMN
San Jose Mercury News| January 2014
“Enrique Salem, former CEO of Symantec, brings 25+ years of executive leadership and business strategy to the ForeScout board of directors…Salem is also on the boards for FireEye, Netskope, Atlassian, DocuSign and Biba.”

 

Business Weekly_Uk
Business Weekly | Kate Sweeney | January 2014
“Security technology warriors Bromium in Cambridge UK and ForeScout Technologies Inc in Silicon Valley have joined forces to provide unprecedented real-time defences against hack attacks…Based on CounterACT’s real-time visibility and policy-based mitigation capabilities, CounterACT can dynamically provision and activate the Bromium endpoint agent, vSentry.”

 

redseguridad
Red Seguridad | January 2014
“Currently NAC vendors are beginning to differentiate their solutions through the numerous combinations with other products…ForeScout Technologies Inc…has been positioned as a “leader” according to the latest Gartner Magic Quadrant December 2013 for NAC.”

 

logo-up-sh
TradeArabia | January 2014
“Westcon will enhance its web security portfolio through ForeScout’s pervasive Network Access Control (NAC) security solutions and distribute these across the UAE, Saudi, Qatar, Oman, Kuwait, Bahrain, Egypt, Libya, Iraq, Lebanon, Jordan, Afghanistan, Pakistan and Yemen…Westcon will distribute the entire suite of ForeScout solutions, including the ForeScout CounterACT platform – along with extended integration modules for SIEM, MDM, vulnerability assessment, advanced threat detection and mobile security.”

 

pro_security_zone_logo
Pro Security Zone | January 2014
“According to the report, vendors in the field are starting to demonstrate differentiation through their ability to integrate with related technologies, a notion which is at the heart of the ForeScout CounterACT platform and ControlFabric architecture which are designed to enhance interoperability between disparate security solutions and serve as catalysts to address continuous monitoring and mitigation…Recent innovations in ForeScout’s CounterACT exemplify the company’s leadership in pervasive network security.”

 

sc_uk_logo
SC Magazine | Peter Stephenson | December 2013
“The big new thing from ForeScout this year is API and its new program/ecosystem. The company has written 66 integrations now and expects many other third-party vendors to join…Add to this a clear focus on bring-your-own-device (BYOD) and the idea of pervasive security throughout the enterprise and you have forward-looking thinking. ForeScout has traditionally been a NAC powerhouse. The experience and creativity that took it there has taken the company to the next level with the innovations of the past year”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | December 2013
“Enterprises looking for more comprehensive, pervasive network and endpoint security will soon have another option to consider. Today, network security vendor and Gartner Network Access Control (NAC) market Magic Quadrant leader ForeScout and endpoint security startup and 2013 Gartner Cool Vendor Bromium announced an integration that the companies promise will take automated threat response to the next level.”

 

All About Security
All About Security | December 2013
“Customers are demanding faster and more comprehensive information about all network assets and means by which they quickly understand whether these devices are properly configured, and whether they comply with the security policies…ForeScout Control Fabric is a technology that allows ForeScout CounterACT and other IT solutions to share information in order to treat a wide range of problems in network and endpoint security.”

 

networkworld
Network World | Jon Oltsik | December 2013
“The issue here is that we don’t know what’s on our networks, and we don’t know the current state of what’s on our networks. Precisely why the Department of Homeland Security (DHS) set aside $6 billion for its Continuous Diagnostics and Mitigation (CDM) program…The contract also includes monitoring, scanning, log management, and SIEM vendors such as Core Impact, ForeScout, McAfee, nCircle, Rapid7, RedSeal, Veracode, Symantec, Splunk, and others.”

 

ehi-logo
E-Health Insider | December 2013
“Organisations looking at network security need to start by find out how many devices are connected to their networks…ForeScout’s customers include Sussex Health Informatics, which is using CounterACT to give it visibility and control of all the devices connecting to its COIN which covers 11 organisations and 40,000 staff…that software that enables that kind of visibility will be increasingly important as NHS organisations continue to merge and take over each other’s IT infrastructure while at the same time working with smaller budgets and smaller teams.”

 

softpedia_logo4a
SOFTPEDIA | Eduard Kovacs | December 2013
“The integration between Bromium’s Live Attack Visualization and Analysis (LAVA) solution and ForeScout’s CounterACT can be leveraged for real-time intelligence gathering, and network-wide defenses capable of protecting enterprises against sophisticated threats…The two solutions work together…When Bromium’s LAVA detects a piece of advanced malware, it sends real-time information to ForeScout’s CounterACT, which automatically performs various actions. “

 

enterprisenetwork
Enterprise Networking Planet | Elizabeth Harrin | December 2013
“Make sure your access policies are up-to-date and that you have a comprehensive, secure approach to network access control (NAC), BYOD, and endpoint encryption, including compulsory anti-malware protection on personal devices. New developments in the resurgent NAC market, such as ForeScout’s recently announced integration with endpoint security startup Bromium, provide innovative solutions.”

 

security-current
Security Current | Bob Tarzey | December 2013
“There is no silver bullet for achieving the often related goals of better security and compliance, but NAC is proving for many to be a key building block in their overall IT security architecture.”

 

CCJ
Cloud Computing Journal | Liz McMillan | December 2013
“SAP Global IT relies on SAP Afaria to manage over 55,000 mobile devices … The company also uses ForeScout CounterACT for network management. The two solutions work well together to accelerate provisioning, administration and security… and ensure that unmanaged devices are not allowed access to the SAP network.”

 

theGuardian
The Guardian | Stuart Dredge | December 2013
“So-called Bring Your Own Device (BYOD) policies are an increasingly familiar part of the working world…ForeScout and Infosecurity Magazine, explored the risks of ‘rogue devices’… Rogue devices are a problem or an opportunity… BYOD is turning IT departments into more of an enabler and less of a controller.”

 

ITsecurityPro
IT Security Pro | December 2013
“Layered security can be a really great approach for IT organisations, but you will only see the true benefits from their investments if the different security layers are working together…Queens College needed better control over endpoint security in order to catch those few outliers that could be used as part of an advanced hacker’s chain of attacks against the college…In order to do that, he leveraged the ControlFabric interface to integrate CounterACT with FireEye’s advanced malware detection engine.”

 

BCW
Business Computing World | Robert McNutt | December 2013
“Today, we see a wide variety of threats still targeting computer networks with each more advanced than the one before…By strategising security in the form of a platform and utilising an automated security control system, a truly secure and compliant network infrastructure can be maintained, and it can also leverage best of breed detection systems, enforcement mechanisms, management solutions and network infrastructure components.”

 

pro_security_zone_logo
Pro Security Zone | December 2013
“Customers who deployed the ForeScout CounterACT platform enjoyed a strong return on investment (ROI) and were highly satisfied with their CounterACT implementation. Of the respondents, 93 percent indicated the product overwhelmingly exceeded or met the ROI requirements, and 94 percent stated they were likely to recommend it to colleagues…Survey results pointed to critical security functions where CounterACT was highly differentiated against competitive solutions, including Cisco Identity Service Engine (ISE). Sixty-seven percent of respondents looked at Cisco solutions before selecting CounterACT.”

 

networkworld
Network World | Jon Oltsik | November 2013
“There is no denying that IT is getting harder to manage as a result of BYOD, cloud computing, IT consumerization, and mobility…When you can’t control everything, you better have tight control and oversight over what you have…Granular policy management is a major theme for Cisco (TrustSec, ISE, SDN, etc.) as well as Forescout…”

 

sc_uk_logo
SC Magazine | November 2013
Best NAC Solution – These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up to date…Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.”

 

WhaTech
WhaTech | November 2013
“Network access control is an aspect of computer security that has been around much longer than the BYOD phenomenon and all the issues thrown up by having mobile devices accessing corporate IT systems…BYOD is now the main driver of growth in the NAC market…Cisco Systems, ForeScout Technologies and Juniper networks accounting for 63 percent between them. “

 

sc_uk_logo
SC Magazine | November 2013
Best Enterprise Security Solution – This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry’s continued evolution.”

 

healthitsecurity
Health IT Security | Patrick Ouellette | November 2013
“Creating a BYOD program that is secure and sensible for all involved in a healthcare organization is difficult enough when the majority of users have similar responsibilities…University of Rochester Medical Center, currently secures and manages more than 15,000 devices all across three hospitals that are connected to the organization’s network…With Fore Scout, we can identify essentially every device on the network and what it’s running. We have a really good finger print of all of that and are getting to the point where we can force full disc encryption on a device prior to giving it network access. “

 

ZoneLogo
Pro Health Service Zone | November 2013
“In healthcare, where patient care takes precedence, a secure network with no disruption to users and service is essential due to the time-critical nature of the industry. Furthermore, healthcare IT professionals face pressure to allow mobile and medical devices on the network, protect sensitive information and comply with industry regulations such as HIPAA…Offering a flexible and cost-effective approach, ForeScout Technologies’ network security solution, CounterACT, provides a comprehensive, easy-to-deploy solution to help healthcare networks gain complete visibility and control of every device.”

 

pro_security_zone_logo
Pro Security Zone | November 2013
“Ardentec, one of Taiwan’s wafer test service providers, has chosen ForeScout CounterACT to gain endpoint visibility and compliance via agentless monitoring and policy enforcement of nearly 4,000 endpoints used by more than 1,000 employees across its four manufacturing sites…Ardentec worked with InfoSource, a ForeScout distributor, to help it identify a network access control (NAC) solution that would allow it to fortify network security at all of its branch locations in order to reduce the risk of unauthorised and unsecured devices gaining access to the company network.”

 

TMCNet black white
TMCnet | Rahul Arora | November 2013
“CounterACT solution…will be used to gain endpoint visibility and compliance via agentless monitoring and policy enforcement of endpoints used by employees…’By using CounterACT as extensively as possible, not only did we improve our overall network security and visibility, but also the effectiveness of our endpoint security investments.’”

 

fiercehealthIT
Fierce Health IT | Ashley Gold | November 2013
“University of Rochester Medical Center…secures and manages more than 15,000 devices all across three hospitals connected to the organization’s network…”

 

Global-security-logo
Global Security Mag | Marc Jacob | November 2013
“Ardentec worked with InfoSource, a ForeScout distributor, to help it identify a network access control (NAC) solution that would allow it to fortify network security at all of its branch locations in order to reduce the risk of unauthorised and unsecured devices gaining access to the company network…CounterACT’s effectiveness in providing increased operational insight and its low impact to their existing environment helped in Ardentec’s decision.”

 

GBFR
Global Banking  & Finance Review | November 2013
“The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise…The integration between ForeScout CounterACT and SAP Afaria MDM is provided via the ForeScout MDM Integration Module, which is an add-on to ForeScout CounterACT”

 

ITsecurityPro
IT Security Pro | November 2013
“Today, we see a wide variety of threats still targeting computer networks with each more advanced than the one before…By strategising security in the form of a platform and utilising an automated security control system, a truly secure and compliant network infrastructure can be maintained, and it can also leverage best of breed detection systems, enforcement mechanisms, management solutions and network infrastructure components.”

 

forbes
Forbes | Dan Woods | October 2013
“As the world moves forward toward a zero-trust model for network security, it will become even more important to understand who and what is connecting to your network and information. ForeScout is designed to provide real-time visibility and enforce endpoint and access security policies on a complex network that contains many different types of devices, from servers, to laptops, to mobile devices and virtual machines.”

 

Tech Target - logo image
Search Security | Shamus McGillicuddy | October 2013
“There is a race to this publish-and-subscribe middleware for security…ControlFabric is based on the concept of “neural networks” where ForeScout lies as the center of the collective security intelligence network…pxGrid is more of a future strategy for Cisco, whereas ForeScout’s ControlFabric is available now.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | October 2013
“Network Access Control vendor ForeScout hopes to capitalize on this with the release of ControlFabric…enables enterprises to integrate security solutions, including MDM, Advanced Threat Detection (ATD), Security Information and Event Management (SIEM), endpoint protection, and vulnerability assessment, into CounterACT, enabling real-time, network-wide visibility into users, endpoints, and applications. “

 

networkworld
Network World | Ellen Messmer| October 2013
“The new ControlFabric interface technology…lets CounterACT…share information it has related to an enterprise network with other security vendors…ControlFabric ‘represents a flexible approach to gain the context and policies necessary to advance endpoint compliance, continuous monitoring and security analytics.”

 

logo_CRN
CRN | Robert Westervelt | October 2013
“ForeScout Technologies is launching ControlFabric as well as an extended technology partner program for network access control, or NAC, integration this week… its platform allows system integrators and users to develop their own policies with multiple types of products, ranging from other security platforms to help-desk ticketing systems.”

 

infosecurity1
Infosecurity | October 2013
“ForeScout Technologies has rolled out the ControlFabric platform, which enables disparate IT security products from multiple vendors to dynamically share information, with analytics and other tools wrapped in to make it all actionable….By leveraging open standards, ForeScout’s ControlFabric platform offers a wealth of opportunity for ISVs, system integrators and customers to gain greater operational context and controls that advance an organization’s network security capabilities towards continuous compliance.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | October 2013
“Network security solutions specialist ForeScout Technologies announced interoperability between the company’s CounterACT network security and SAP Afaria mobile device management (MDM) platforms…Through this integration, businesses can fortify a range of user, device, application and data policies though network-enforced controls, such as password strength, configuration, application use, encryption and data protection.”

 

TMCNet black white
TMCnet | Rajani Baburajan | October 2013
“The combination of ForeScout CounterACT and SAP Afaria aims to enable companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise…The pairing of network access control (NAC) with MDM allows enterprises to see and detect all unmanaged, corporate and personal mobile devices and apply security policies based on user, role and device to automatically limit access.”

 

All About Security
All About Security | October 2013
“ForeScout Technologies today announced the compatibility of ForeScout CounterACT network security with the mobile device management (MDM) platforms from SAP Afaria. The combination enables companies to accelerate the deployment, management and security of proprietary and personal mobile devices, applications and data.”

 

Security Insider
Security Insider | October 2013
“With the new controlFabric platform, ForeScout infrastructure company data should be used to improve IT security easier. The integrated solution is using plug-ins, common network infrastructure, devices, directories, and system management products in the ForeScout CounterACT network security solution.”

 

GBFR
Global Banking  & Finance Review | October 2013
“The ControlFabric Technology Partner Program allows ForeScout to further collaborate with industry-leading hardware and software vendors, examine ways to team their solutions with ForeScout CounterACT and deliver greater customer value…The two participation program levels, partner and gold, are determined by the level of commitment to the program and adoption by customers employing the integrated solution.”

 

ITsecurityPro
IT Security Pro | October 2013
“Known as ControlFabric, the tech is billed as optimising network security and IT resources by delivering an open approach to dynamic visibility, intelligence and remediation…Commenting on the new technology, Fran Howarth, an analyst with Bloor Research, said that continuous monitoring in real time is an ever-increasing requirement.”

 

security manager
Security Manager | October 2013
“As hackers to enterprise systems are becoming faster and more innovative in attacks, companies need to continually improve their technology in order to respond adequately to refined, new attack techniques…. ForeScout’s solution works without agents and is able to report striking endpoints to all leading SIEM / SOC systems back.”

 

cbrnews
CBR | Ben Sullivan| October 2013
“The platform features new interfaces that open ForeScout CounterACT to developers, customers and system integrators, allowing them to ‘flexibly integrate CounterACT with other security and management systems.’…’Developed and proven over the last few years, the ForeScout ControlFabric platform allows customers to mobilise their enterprise tools and operational data in truly creative ways that dramatically improve visibility, risk management and productivity.’”

 

Security Insider
Security Insider | October 2013
“With the new controlFabric platform, ForeScout infrastructure company data should be used to improve IT security easier. The integrated solution is using plug-ins, common network infrastructure, devices, directories, and system management products in the ForeScout CounterACT network security solution.”

 

Itsecuritygurunews
IT Security Guru | October 2013
“ForeScout chief marketing officer Scott Gordon said that the ControlFabric technology was long in production and was part of the most recent version of CounterACT…’Now users can use this to send information in real time from the solution and any company can send to us for real time mitigation for an endpoint.’”

 

All About Security
All About Security | October 2013
“ForeScout Control Fabric is an open platform…that exchanges information and other IT solutions and can defuse a wide range of security issues in networks and endpoints…’IT organizations need defense systems that are not only interoperable but also provide more benefits than the individual solutions for themselves. It’s about maximizing the ROI of people, processes and tools, “said Gord Boyce, CEO of ForeScout.’”

 

networkworld
Network World | Ellen Messmer| October 2013
“ForeScout ControlFabric…is an open platform that enables ForeScout CounterACT and other IT solutions to dynamically exchange information and mitigate a wide variety of network and endpoint security concerns.”

 

IT Security Journal
IT Security Journal | Kim Borg | October 2013
“Common defense-in-depth approach often yields silos of tools and plenty of data, which leave the security team to try and connect the dots…IT Security Journal reported about Cisco’s pxGrid framework a few months ago. Looks like ForeScout has thrown down the gauntlet with their ControlFabric platform.”

 

FInancialnews
Financial News | Gulli Arnason | October 2013
“The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise.”

 

datensicherheit.de
Datensicherheit.de | Carsten Pinnow | October 2013
“ForeScout Control Fabric is… an open platform to exchange information on ForeScout CounterACT and other IT solutions and can defuse a wide range of security issues in networks and endpoints. The platform supports companies through infrastructure data to raise situational awareness and policy-based controls to accelerate repair measures to improve the security status and also to automate routine tasks.”

 

GFM_news
GFM Nachrichten | October 2013
“The provider of comprehensive network security solutions, announced that its security platform is now compatible with SAP MDM platforms…In this way, companies can accelerate and enhance the deployment, management and security of company-owned and personal mobile devices, applications and data.”

 

TMCNet black white
TMC Net | Nathesh (Contributor) | October 2013
“By participating in the newly unveiled ControlFabric Technology Partner Program by ForeScout, developers and system integrators can learn about the means to enhance their network security capabilities…The company is also hoping to leverage this program to work together with major hardware and software vendors and identify the means to integrate the ForeScout CounterACT solution with…More than 30 technology partners, including new members Motorola, Palo Alto Networks and Splunk Inc. are said to be the working with ForeScout as part of this program.”

 

GBFR
Global Banking  & Finance Review | October 2013
“Gord Boyce, CEO of ForeScout discusses ControlFabric platform, integration and CounterACT…The ControlFabric platform delivers interoperability for increased ROI.”

 

SiliconANGLE
SiliconANGLE | Mellisa Tolentino | October 2013
“IT administrators are up to their necks juggling mobile security solutions and infrastructure support to enable to BYOD movement, and there’s a slew of third party solutions looking to close the gap on IT and BYOD to smooth this rather abrupt transition into the mobile era…ForeScout offers three levels of BYOD security to fit a range of budgets, but the main foundation of its mobile security offering is the ForeScout CounterACT, which is a network-based appliance that works on PCs and mobile devices.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | October 2013
“ForeScout and Splunk…announced a technology partnership combining ForeScout’s dynamic endpoint visibility, access and security capabilities with Splunk Enterprise’s advanced machine data analytics expertise…’ForeScout CounterACT provides visibility to network and endpoint activity that our customers can use to augment their Splunk analytics in order to monitor for critical security issues and expedite investigations,’ Bill Gaylord, senior vice president of business development at Splunk, said in a statement.”

 

sc_uk_logo
SC Magazine | October 2013
“In preparation for our installation, ForeScout provided a hardware appliance (the CT 100 model) and a large amount of easy-to-read documentation. From unpacking the appliance to getting the system up and operational, it took under 30 minutes to start tracking data… This was a pleasing experience from beginning to end. Best Buy.”

 

1488.eweek_logo2
eWeek | Darryl K. Taft | October 2013
“By combining ForeScout’s dynamic endpoint visibility, access and security capabilities with Splunk Enterprise’s advanced machine data analytics capabilities, enterprises gain enhanced threat insight and automated control, the company said…CounterACT helps organizations gain complete visibility for all devices, users, systems and applications attempting to connect to or on an enterprise network–wired or wireless, managed or unmanaged, PC or mobile”

 

Channel Marketer Report
Channel Marketer Report | October 2013
“ForeScout Technologies, a network security solutions provider, has unveiled the new ControlFabric Technology Partner Program, which aims to urge developers, system integrators and customers to integrate CounterACT with other security and management systems. The new program allows ForeScout to better collaborate with hardware and software vendors, and in turn, find ways ForeScout CounterACT can help ramp up partner solutions.”

 

pro_security_zone_logo
Pro Security Zone | October 2013
“ForeScout Technologies has announced the ControlFabric platform to enable IT security products to dynamically share information and allow enterprises to more rapidly respond to a range of enterprise security and operational issues…The platform features new interfaces that open ForeScout CounterACT to developers, customers and system integrators, allowing them to flexibly integrate CounterACT with other security and management systems.”

 

Insurance_networking
Insurance Networking News | Jennifer Morrell | October 2013
“ForeScout adds that CounterACT and SAP Afaria offer the ability to see and detect all unmanaged, corporate and personal mobile devices, such as iPads, iPhones and Androids; readily apply security policy based on user, role and device; trigger SAP Afaria to profile check managed devices upon network resource request to detect jail-broken, rooted and non-compliant handhelds.”

 

help net security
Help Net Security | October 2013
“ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise.”

 

VSR
Vertical Systems Reseller | October 2013
“The integration between ForeScout CounterACT and SAP Afaria MDM is provided via the ForeScout MDM Integration Module, which is an add-on to ForeScout CounterACT, the company’s award-winning network security solution. ForeScout CounterACT is a real-time security solution that delivers complete visibility and automated control for all devices, users, systems and applications attempting to connect to or on an enterprise network – wired or wireless, managed or unmanaged, PC, VM, embedded or mobile.”

 

ChanneleBiz_Logo
ChannelBiz | Nick Booth | October 2013
“Security vendor ForeScout Technologies has achieved interoperability between its CounterACT system and SAP’s Afaria mobile device management (MDM) platforms…Together CounterACT and Afaria promise to see and detect all unmanaged, corporate and personal mobile devices, such as iPads, iPhones and Androids as they come in over any network.”

 

Channelpartner.es
Channel Partner | October 2013
“Threat levels are increasing and solutions for access control are essential… ForeScout…NAC and MDM leader in its sector… is the first manufacturer to launch the new generation of NAC, also called EVAS (Endpoint Visibility Access and Security).”

 

networkworld
Network World | Ellen Messmer| September 2013
“At New York Law School…BYOD security is enforced primarily through a ForeScout Technologies hardware appliance called CounterACT that can tackle network access control in an agentless fashion…Today, about 3,700 devices that students bring with them (Apple devices predominate) gain access to the network this way through CounterACT, which also watches to see if they might be bringing in malware.”

 

cbrnews
CBR | Amy-Jo Crowley| September 2013
“ForeScout…will integrate its CounterACT solution with Splunk’s data analytics capabilities… CounterACT would send its already analysed data to Splunk, which analyses big data from websites, applications sensors and mobile devices, for further analysis… Scott Gordon, CMO at ForeScout, said IT decision makers are today face visibility and control gaps given the surge in network complexities, BYOD proliferation and sophisticated threats.”

 

channel prosmb
Channelpro SMB | September 2013
“Continuous monitoring and mitigation technology requires a dynamic approach to ensure endpoint integrity, policy adherence, and security improvement…Network access control (NAC) helps IT gain a more dynamic and secure posture because it can identify and classify all network assets, and can assess the defense and compliance posture of all endpoints in real time, including mobile devices. “

 

Bloor
Bloor Research | Fran Haworth | September 2013
“Today’s NAC technologies interface directly with many other network security controls to ensure that all reports that they generate present a complete and accurate picture regarding all endpoints on the network…NAC technologies are evolving so fast that the term may disappear entirely in the not too distant future.”

 

CSO Resource for Security
CSO | John P. Mello Jr. | September 2013
“‘Patching systems, however, is a problem even for companies with a management system in place to do it, said Scott Gordon, CMO of ForeScout Technologies. That’s because the patching process can be gap prone. “We find that from five to 25 percent of operating environment where there’s change management and patching there’s a gap where the management system is saying one thing and the host configuration is not in parity,’ Gordon said in an interview.”

 

infosecurity1
Infosecurity | Bob Tarzey | September 2013
“At the Infosec Europe event in April this year, Quocirca chaired a panel session where three users of NAC from very different business sectors explained why they had invested in the technology, how it helps them overcome GRC challenges and better enables both BYOD and guest network access.”

 

Heise Resale
Heise Resale | September 2013
“ForeScout Technologies strengthens its management team in Europe, the Middle East and Africa with Louise Bulman…Bulman takes over the post of vice president of EMEA sales…her extensive experience as a sales manager will allow ForeScout to implement its long-term business goals and industry in Greater Europe”

 

Universitybusiness
University Business | Matt Zalaznick | September 2013
“The intensification of cyberattacks against universities and colleges means institutions need more than just clever passwords and the latest antivirus software to protect themselves from today’s more powerful hackers…ForeScout Technologies has a solution that can identify the security vulnerabilities of any device connected to an institution’s network and provide upgrades, says Scott Gordon, the company’s chief marketing officer.”

 

ITsecurityPro
IT Security Pro | September 2013
“Great by-product from this process is the ability to connect automatically to `headless’ devices on the network and provide them with the appropriate access…A headless device is any endpoint that does not have the ability to authenticate with entered credentials.For example, a printer does not connect to the network and allow an end user to enter in a login and password in order for the printer to gain network access.”

 

Report
Report | September 2013
“Part of the BYOD indecision results from the fact that executives… look at the situation and ask themselves whether they should block the employee devices or allow them access…it is imperative to build some flexibility into the BYOD model by adding granularity to the access level based on the user, the device type, etc. Such an approach may also shift the type of technology needed to control the use of mobile devices. “

 

computerweekly
Computer Weekly | Bob Tarzey | September 2013
“There is an increasing need in many organizations to provide network access to guests (such as contractors and consultants) on an ad hoc basis. These two requirements have seen a resurgence of interest in network access control (NAC) systems from established vendors such as ForeScout…”

 

CSO Resource for Security
CSO | John P. Mello Jr. | August 2013
“While most universities have had their students use their own hardware for years, a big bump in corporate BYOD occurred in 2010 when tablets began to proliferate…Universities have always had students bring their own devices, but they have less control over those endpoints.”

 

Federal-Times
Federal Times | Nicole Johnson | August 2013
“Agencies are trying to manage threats in real time…Key to that will be equipping agencies with both tools and experts through a $6 billion, five-year contract…Nearly a dozen of the 17 vendors DHS selected have included ForeScout’s offering as part of their wider suite of tools.”

 

networkworld
Network World | Ellen Messmer| August 2013
“The underlying goal of this massive “Continuous Diagnostics and Mitigation” (CDM) contract is to spur federal civilian agencies to move away from static approaches to network-security compliance reporting in favor of real-time monitoring…ForeScout, for example, said its CounterACT monitoring product has been included in product suites put forward by 11 out of the 17 systems integrators winning the contract.”

 

ITsecurityPro
IT Security Pro | August 2013
“CounterACT discovers endpoint changes that might be undesirable, as well as suspicious and/or malicious behavior…By design, CounterACT is an intelligent security automation platform that uses its unique real-time visibility of all network endpoints and its interoperability with existing network security infrastructure to provide a redundant and scalable security solution.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | August 2013
“EVAS goes beyond access control to encompass several other vital enterprise network security functions: real-time visibility and monitoring of all endpoints, including personal mobile devices; granular control of network access; and enhanced security capabilities, including policy enforcement and threat remediation… NAC market leader ForeScout welcomes the new category.”

 

networkworld
Network World | Jon Oltsik | August 2013
“When security analysts need up-to-the-minute information for critical remediation activities, they have to scramble around through a myriad of management systems to retrieve it. EVAS knows which mobile and PC endpoints are on the network at all times. EVAS knows the state of these assets (i.e. configurations, patches, ownership, applications, etc.).”

 

Channel Marketer Report
Channel Marketer Report | August 2013
“The 17 selected federal systems integrators that received the award will offer government agencies sensors, risk-status displays and consulting services from contractors, the majority of which included ForeScout as a strategic component of their security solution, according to company officials…CounterACT will help federal agencies improve their cybersecurity posture through real-time asset discovery and policy-based remediation capabilities.”

 

Tech Target - logo image
Tech Target | James Fubush | August 2013
“The influx of employee-owned mobile devices, Software as a Service apps and other elements beyond IT’s control drive organizations to reevaluate their network access control security…’My experience with older NAC systems was they weren’t worth the hassle,’ said Nick Duda, principal information security engineer at Vistaprint…Vistaprint uses ForeScout’s CounterACT automated security control product to close the gaps where Microsoft’s SCCM has problems.”

 

TMCNet black white
TMC Net | Carolyn Dawson | August 2013
“Enterprise Research Group or ESG has unveiled a report “The Endpoint Visibility, Access, and Security (EVAS) Market: The Evolution of Network Access Control (NAC)…ForeScout ‘innovation and sales growth well supports ESG’s EVAS outlook, and more importantly, EVAS reflects how the majority of our enterprise and government customers use CounterACT daily to ensure a more secure network,’ said Gord Boyce, CEO of ForeScout Technologies”

 

ComputerWoche
Computerwoche | August 2013
” BYOD initiatives focus on allowing employees to access corporate data from personal devices such as tablets, smartphones and laptops…verify if your employees are going to use their LDAP (Active Directory, eDirectory, etc.) credentials to gain access to data on the corporate network or if pre-determined credentials that may be configured on the NAC appliance will be used for access. “

 

Next gov
Nextgov | Aliya Sternstein | August 2013
“The Homeland Security Department chose 17 vendors for a potential $6 billion network threat-monitoring project that will offer all civilian agencies the services at no cost to them…Each vendor will offer agencies a menu of sensors, risk-status displays and professional consulting services from subcontractors such as McAfee, ForeScout and Veracode”

 

Cloud Watch
Cloud Watch | August 2013
“ForeScout Technologies KK, a Japanese subsidiary of ForeScout, looks to increase services provided to existing partners, strengthening localized technical support, developing new customers through high-touch sales and partner engagement and strategically selecting new partners in key markets.”

 

Security Insider
Security Insider | August 2013
“With the smorgasbord of compliance and governance mandates putting pressure on enterprises today, many companies have mapped tools and controls across industry and regulatory compliance frameworks to more efficiently institute governance, risk and compliance (IT-GRC) best practices.”

 

http://www.mspmentor.net/2012/02/22/forescout-opens-platform-for-mobile-device-management-integration/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+MspMentor+%28MSP+Mentor%29