In the News

sc_uk_logo
SC Magazine | Greg Masters | April 2014
Network Rx: Health Care Security
“A secure network with no disruption to users and service is essential for the operations of any enterprise, but owing to its time-critical nature perhaps nowhere is it as vital than in the health care industry. Additionally, taking a device offline in a hospital setting can literally put a person’s life at risk, so this adds a level of complexity to securing the network…The center already used tools from Bradford, Cisco and ForeScout and found Bradford and Cisco not compatible with its new needs…ForeScout CounterACT’s agentless approach was key.”

 

cbrnews
CBR | Duncan McRae | April 2014
How Nottingham Trent University has Bolstered its Wireless Defences
“With more than 25,000 students and 2,500 staff spread across three campuses, NTU’s wireless network accommodates about 6,000 active wireless endpoints — and 10,000 “seen” endpoints — figures that grow continually as students bring more of their own devices (BYOD), including laptops, smartphones, tablets and gaming devices, onto the network…After implementing CounterACT, calls to the IT helpdesk were reduced, which has contributed to cost-savings for NTU. “

 

Security Insider
Security Insider | April 2014
Policy-based Protection for the Whole Network
“…excellent functionality and intuitive operator guidance in our tests… very powerful policies, which can be used efficiently for full protection and proactive safeguarding of all services and components in company networks… enables administrators to create a central point for security management in their environment. We award ForeScout CounterACT IAIT Tested and Recommended.”

 

network_computing_uk
Network Computing | April 2014
The Infosec Imperative: Squaring the Circle
“Successful organisations are progressing their techniques and their tool arsenal including the use of next-generation network access control…Enterprises are becoming more complex and the threat landscape is evolving rapidly. Network security has to be pervasive and continuous which requires IT teams to better leverage security tool interoperability and policy-based automation.”

 

TMCNet black white
TMC Net | Shamila Janakiraman  | April 2014
ForeScout Releases e-Book Focusing on Next-Gen Network Access Control
“Using the company’s pervasive network security solutions, organizations can continuously monitor and mitigate security exposures and cyber-attacks…pecial emphasis is given to next-gen NAC technology along with the capabilities of next-gen NAC solutions. Deployment considerations including processes, technologies and techniques involved with NAC solutions are highlighted.”

 

sc_uk_logo
SC Magazine | Greg Masters | April 2014
Network Rx: Health Care Security
“A secure network with no disruption to users and service is essential for the operations of any enterprise, but owing to its time-critical nature perhaps nowhere is it as vital than in the health care industry. Additionally, taking a device offline in a hospital setting can literally put a person’s life at risk, so this adds a level of complexity to securing the network…The center already used tools from Bradford, Cisco and ForeScout and found Bradford and Cisco not compatible with its new needs…ForeScout CounterACT’s agentless approach was key.”

 

cbrnews
CBR | Duncan McRae | April 2014
How Nottingham Trent University has Bolstered its Wireless Defences
“With more than 25,000 students and 2,500 staff spread across three campuses, NTU’s wireless network accommodates about 6,000 active wireless endpoints — and 10,000 “seen” endpoints — figures that grow continually as students bring more of their own devices (BYOD), including laptops, smartphones, tablets and gaming devices, onto the network…After implementing CounterACT, calls to the IT helpdesk were reduced, which has contributed to cost-savings for NTU. “

 

CSO Resource for Security
CSO | Maria Korolov | April 2014
Forgotten Risks Hide in Legacy Systems
“Routers and switches don’t do a particularly good job identifying what’s connected to them, he says, especially devices that only connect intermittently…
To deal with this issue, Pioneer Investments uses tools from security firm ForeScout Technologies, which can identify and manage network connections and even monitor them for suspicious or unusual activity.”

 

TMCNet black white
TMC Net | Nathesh | April 2014
Nottingham Trent University Monitors and Mitigates Security Risks with ForeScout CounterACT
“Using the ForeScout CounterACT solution, the Nottingham Trent University is hoping to monitor and mitigate security risks from devices accessing its wireless network and also deliver end-user ease of use…NTU will use of ForeScout CounterACT; an automated security control platform that lets the university to see, monitor, and control all users, operating systems and devices.”

 

techworld
Tech World | John Dunn | March 2014
Nottingham Trent University Buys ForeScout to Secure Booming Wi-Fi Network
“Nottingham Trent University (NTU) has completed the installation of Forescout’s network access control platform as part of a long-running plan to rationalise, upgrade and secure its once-sprawling Wi-Fi network…The new CounterACT NAC system will allow the University’s 25,000 students and 2,500 staff to use Wi-Fi across its three campuses in the city, avoiding the old system’s inconvenient and much complained about requirement that an agent be run on each endpoint.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | March 2014
Beef Up Security with Automation
” How can human teams keep up with threats streaming in from a proliferation of endpoints both inside and outside the corporate perimeter? Network Access Control (NAC) market leader ForeScout and advanced threat protection vendor Damballa aim to solve the problem with a partnership announced today…Additionally, the ForeScout/Damballa integration will enable the collection of additional threat intelligence as malware is detected and can analyze malware traces on compromised devices, then use that intelligence…to discover additional devices that were also infected and take steps to remediate those, too.”

 

1488.eweek_logo2
eWeek | Sean Kerner | March 2014
Why Former Symantec CEO Enrique Salem Is Invested in Security
“(ForeScout) is going to help with the transition away from the traditional client architecture and also the transition that’s happening in the datacenter… ForeScout is at the nexus of the client and datacenter architecture…. Clearly I believe they will be in the next set of big market leaders.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
University Improves Security and Access Control on Wireless Network
“Nottingham Trent University (NTU) will monitor and mitigate security risks from devices connecting to its wireless network whilst at the same time maintaining ease of use for end users by deploying CounterACT from ForeScout Technologies…After implementing CounterACT, calls to the IT helpdesk were reduced, which has contributed to cost-savings for NTU.”

 

searchsecurity
Search Security | Brandan Blevins | March 2014
Advanced Threat Detection Products Yet to Earn Trust of Enterprises
“Damballa last week announced integration between its Failsafe product and the technology of Campbell, Calif.-based network security vendor ForeScout, perhaps best known for its network access control product, a move that Foster said will reduce the resources needed to manually handle alerts.”

 

logo_CRN
CRN | Rob Wright | March 2014
30 Notable IT Executive Moves
“Network security vendor ForeScout Technologies named three new vice presidents last month, starting with Paul Phillips, who was appointed as senior vice president of corporate and business development…Laura Owen as vice president of human resources, where she is responsible for all employee communications, recruiting and HR systems…Lastly, ForeScout Technologies named Darren Milliken as senior vice president, general counsel and corporate compliance officer.”

 

SF Gate
SF Gate | Jillian Sullivan | March 2014
Hires and Promotions, March 30
“ForeScout added Paul Phillips as senior vice president of corporate and business development; Laura Owen as vice president of human resources; and Darren Milliken as senior vice president, general counsel and corporate compliance officer.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
Advanced Threat Protection Partnership
“ForeScout forms technology partnership with Damballa to provide automatic breach detection and mitigation of advanced threats…The integration of Damballa’s Failsafe technology with ForeScout’s CounterACT platform will increase visibility of advanced threats and enable automatic remediation across enterprise networks thereby releasing human resources enabling them to keep up with advanced threats.”

 

GBFR
Global Banking and Finance | March 2014
ForeScout Receives Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security
Administrators of security technologies need tools that simplify and automate the task of managing security…ForeScout Technologies has received the Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security…based on ForeScout CounterACT and its advanced ControlFabric architecture…ForeScout’s CounterACT platform, which provides visibility, control and mitigation, and its ControlFabric architecture, which enables interoperability between network and security infrastructure, deliver such network security innovation today.”

 

BCW
BCW | March 2014
Does Your Business Have a ‘NAC’ for Cyber Threats?
“A ’2014 Cyberthreat Defence Report’ by CyberEdge Group was underwritten by nine firms across the network security world and revealed that network access control (NAC) was rated the most effective security technology in defending against cyber threats…To address common security challenges, many organisations are now supplementing their existing security products with pervasive network security technologies, like NAC, to dynamically view and control user, device, application and access diversity.”

 

All About Security
All About Security | March 2014
Can You Manage Something You Can Not See?
“At the heart of each viewpoint, everyone would agree that continuous monitoring starts with visibility. Whether you are monitoring a global class enterprise or a single set of systems that make up a primary application, visibility is paramount…The key is to automate the gathering of data, and with advancements in today’s technologies, inventories can be automatically established and updated in real time.”

 

TMCNet black white
TMC Net | Michelle Amodio | March 2014
Comings & Goings: Tech Execs on the Move
“ForeScout Technologies saw three new executives enter its workforce as it grows as a network security provider…The company welcomed Paul Phillips, Laura Owen and Darren Milliken, all of whom bring various talents and leadership skills, including business development, human resources, and counsel.”

 

logo_main
Channel Partner | Karl-Erich Weber| March 2014
Personal Messages of the Week 09/2014
“ForeScout Technologies has expanded its management team with three new executives: Paul Phillips, VP business development; Laura Owen, VP HR; and Darren Milliken, general counsel and compliance officer.”

 

pro_security_zone_logo
Pro Security Zone | March 2014
Network Security Innovation Leadership Award
“ForeScout Technologies has received the 2014 award for “Global Technology Leadership Innovation in Network Security” from Frost & Sullivan…Based on ForeScout CounterACT and its advanced ControlFabric architecture, the award recognises the company’s focus on enhancing customer value, which has resulted in improved customer retention and, ultimately, increased market potential.”

 

infosecurity1
Infosecurity | Eleanor Dallaway | February 2014
RSA Conference 2014: Enrique Salem Names Forescout the Vendor of 2014
“I look at the mega trends in the market place…consider disruptions and who will be the new winners. Team and leadership are also important to me, and finally market demand…Palo Alto was the company of 2012, FireEye the company of 2013, and ForeScout will be the company of 2014…ForeScout has the leadership role in the network space, and they make it about the eco-system of partners. I’m thrilled to be a part of it”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | February 2014
ForeScout RemoteControl to Deliver Continuous Compliance
“Both BYOD and the increasing mobility of enterprise workforces introduce new uncertainties and additional threats to distributed data environments, often requiring new solutions to ensure compliance…CounterACT RemoteControl aims to fill in the compliance gaps by providing continuous visibility and policy enforcement of both corporate and personally owned devices, even when off the enterprise network…”

 

pro_security_zone_logo
Pro Security Zone | Jonathan Newell | February 2014
How to Enforce Policies When Endpoints are Increasingly Not Connected to the Network
“Nearly 33% of the workforce would be working remotely by 2015… and are not necessarily always plugged into the network controlled by the company that they work for. RemoteControl is part of the CounterACT system but the appliance is outside the corporate firewall…automatically reflects the policy settings of CounterACT… maintaining a compliant posture at all times when connected to any network, the device is less likely to encounter problems when next connecting to the corporate network.”

 

Sanabria
451 Research | Adrian Sanabria | February 2014
Vistaprint Finds Much More Than NAC in ForeScout’s CounterACT Offer
“ForeScout is known for NAC, even though 40% of its customers don’t buy CounterACT for policy enforcement. Learn more about how Vistaprint found success with the product in an area it didn’t originally anticipate.”

 

TMCNet black white
TMC Net | Shamila Janakiraman | February 2014
ForeScout’s CounterACT RemoteControl Provides Endpoint Visibility, Control
“It has become imperative for businesses to provide an extended enterprise network so that employees can securely access corporate networks and hosted corporate resources…ForeScout Technologies, a specialist in pervasive network security solutions, plans to launch CounterACT RemoteControl, a solution that will help IT organizations implement a policy to remotely monitor corporate and personally owned devices.”

 

Computerworld
Computerworld | Jaikumar Vijayan | February 2014
Booze, Bots and Other RSA Ruminations
“RSA says 400 vendors registered for the event. I believe them. Intel appears to have one of the largest booths, and it’s not even a security vendor, although it did acquire security company McAfee a few years ago. BeyondTrust’s booth has a high-striker for people to try out their strength, eSentire has a model elephant, ForeScout has a boxing ring with stunt boxers and CA has a booth that looks like the endoskeleton of a prehistoric creature. Germany has a booth.”

 

dark_reading_logo_small
Dark Reading | Kelly Higgins | February 2014
NAC Comes Back
“Now the next-generation NAC is agentless, and any device can be evaluated. You also now have the choice of quarantining the device…The mobile threat is the main driver for this resurgence of interest in NAC…Gartner late last year pointed out how BYOD has injected new life into NAC.”

 

fcw-logo
FCW | Frank Konkel | February 2014
Don’t Be Too Sure About the State of Your Security
“The 2014 Cyberthreat Defense Report, a detailed study of 763 IT security decision makers and practitioners from large organizations in 11 countries. The report was completed by CyberEdge Group LLC and sponsored by ForeScout and eight other information security companies…The Cyberthreat Defense Report is a highly detailed analysis of the current security postures, perceptions, concerns and future plans of large organizations across 19 industries.”

 

networkworld
Network World | Ellen Messmer | February 2014
Hot, New Products From RSA
“CounterACT RemoteControl…Helps enterprises ensure remote employee and corporate-owned devices remain endpoint compliant when not attached to the corporate network, a highly sought after enterprise capability.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | February 2014
Network Access Control Found Most Effective Against Threats
“Network access control (NAC) is rated highest of all the security technologies in its potential to defend against today’s cyber-threats, and 77 percent of IT professionals are using or plan to use NAC for mobile security…The survey also indicated NAC is the most often-used technology to detect vulnerabilities and security misconfigurations within transient laptops and mobile devices (51 percent), and NAC is the most often-used technology (53 percent of respondents) to detect host security misconfigurations.”

 

fierceIt
FierceIT Security | Fred Donovan| February 2014
Many IT Pros Turning to NAC for Mobile Security
“More than three-quarters of IT pros are using or planning to use network access control technology to improve mobile security…NAC received the highest mark in terms of the effectiveness of cyberthreat defense products with a score of 3.71 out of 5.”

 

ZoneLogo
Pro Health Service Zone | Jonathan Newell | February 2014
Medical IT Infrastructure Security
“ForeScout reviews the task of ensuring the IT infrastructure in medical facilities is secured in its entirety including connected instruments and devices…IT networks in hospitals, clinics and surgeries have some special characteristics that differentiate them from commercial networks with patient safety and confidentiality being at the top of the list of critical factors that network managers have to consider in ensuring the IT infrastructure is secure and reliable.”

 

InformationSecurityBuzz
Information Security Buzz | February 2014
Does Your Organization Have a ‘NAC’ For Cyberthreat Defense Security?
“The percentage of organizations formally endorsing BYOD initiatives is expected to skyrocket from 31 percent in 2014 to 77 percent in 2016…Network access control (NAC) was rated the most effective security technology in defending against cyberthreats.”

 

healthitsecurity
HealthIT Security | Nicole Freeman | February 2014
Network Access Control an Asset to System Security
“For many organizations, NAC provides additional security by controlling devices, applications, and users on a network. For healthcare providers using mobile devices or with a BYOD policy in place, being able to remove unwanted devices or users from a network is a simple step in security…NAC is an important weapon within many organizations’ arsenals and for good reason. Many of our respondents saw it as a versatile tool that could support protection efforts ranging from BYOD policy enforcement to configuration management.”

 

SYSBUS
Sysbus |Götz Güttich | February 2014
Network Access Control is Considered Most Effective Security Technology to Defend Against Cyber Threats
“Report indicates…77 percent of IT experts also see a compelling need for continuous monitoring and risk reduction, and more than 60 percent of the participants experienced in 2013 a privacy violation, with a quarter of all participants cites lack of investment by the employer in adequate defense measures as a factor…To face these challenges, many companies supplement their existing security investment by NAC of the next generation to be able to see and control dynamically with the aim of users, device, application and access diversity.”

 

TMCNet black white
TMC Net | Kasey Schefflin-Emrich | February 2014
Comings & Goings: ForeScout Technologies Names Three New Executives
“As cyber attacks are becoming more commonplace, Internet security is erupting into a much sought after business.To meet this increasing demand, network security solutions provider ForeScout Technologies has expanded its leadership team with the addition of three new executives…each possess key qualities that will help bolster the company for long-term success – experience, leadership, dynamic personality and a proven track record”

 

Itsecuritygurunews
IT Security Guru | Dan Raywood | February 2014
UK Government Rolls Out Security Operations Centre
“The CDM initiative was intended to offer better visibility into threats and was deployed in the United States to enable Government departments to expand their continuous diagnostic capabilities by increasing their network sensor capacity, automating sensor collections and prioritising risk alerts…Of the 17 contractors in the US, 14 of them are using ForeScout CounterACT. They are there to put the tools in; it could be McAfee, Symantec or IBM solutions, but we are part of the tool portfolio “

 

GBFR
Global Banking  & Finance Review | February 2014
ForeScout Expands Executive Team By Appointing Three New Vice Presidents
“Leading pervasive network security solutions provider, ForeScout, has announced that three new executives have joined the company – Paul Phillips, senior vice president, corporate and business development; Laura Owen, vice president of human resources; and Darren Milliken, senior vice president, general counsel and corporate compliance officer.”

 

Whir
Wired Innovation Insights | David Hamilton | February 2014
NAC Rated Best Technology for Securing Networks and BYOD Scenarios: Poll
” Also found that 77 percent of IT professionals use NAC or are planning to use it for mobile security…More than half (53 percent) of respondents said they use NAC to detect host security misconfigurations, and 51 percent use NAC to detect vulnerabilities and security misconfigurations in transient laptops and mobile devices.”

 

channelpro
Channel Pro Network | February 2014
ForeScout Plans for BYOD Monitoring Add-On
“Network security specialist ForeScout Technologies Inc. has revealed plans for a monitoring solution that will provide its CounterACT platform users with an integrated means of monitoring mobile devices and enforcing security policies…Called CounterACT RemoteControl, the solution will “bolster endpoint security for devices both on and off the network”

 

SJMN
San Jose Mercury News| February 2014
ForeScout Expands Leadership Team
“ForeScout has announced that three new executives have joined the company – Paul Phillips, senior vice president, corporate and business development; Laura Owen, vice president of human resources; and Darren Milliken, senior vice president, general counsel and corporate compliance officer.”

 

GBFR
Global Banking and Finance Review | February 2014
Survey Indicates Network Access Control Perceived as Most Effective Security Technology to Defend Against Cyberthreats
“The results of the ‘2014 Cyberthreat Defence Report’ point to the wins, gaps and importance of advancing defensive strategies to enforce controls and pre-empt attacks. As such, many organisations are investing in automated techniques, including next-generation network access control (NAC).”

 

logo
Wired Innovation Insights | February 2014
Security and the IT Treadmill of Doom
“A recent survey conducted by Enterprise Strategy Group showed that 44 percent of enterprises said they wanted to move toward a more integrated security architecture in the next 24 months…Already, 25 IT security companies have joined the program that we call ControlFabric. ControlFabric is based on open APIs that make it possible for IT security managers, system integrators and product vendors to mix and match product connections and make it easier to automate security responses.”

 

All About Security
All About Security | February 2014
Network Access Control as the Most Effective Security Technology to Defend Against Cyber Threats?
“To face these challenges, many companies supplement their existing security investment by NAC of the next generation to be able to see and control dynamically with the aim of users, device, application and access diversity…This bodes well for the CounterACT platform ForeScout. The new platform enables IT security products in the able to exchange information dynamically and enables companies to react faster to different safety and operational problems.

 

ComputerWelt
ComputerWelt | February 2014
SPAN SPAN or Not – That is the Question
“Now the next-generation NAC is agentless, and any device can be evaluated. You also now have the choice of quarantining the device…The mobile threat is the main driver for this resurgence of interest in NAC…Gartner late last year pointed out how BYOD has injected new life into NAC.”

 

datensicherheit.de
Datensicherheit.de | February 2014
ForeScout Expands Leadership Team
“ForeScout Technologies expanded its management team with three new executives…Paul Phillips, Senior Vice President of Corporate and Business Development, Laura Owen, vice president of human resources, as well as Darren Milliken, Senior Vice President, General Counsel andCorporate Compliance Officer.”

 

Campus Technology
Campus Technology | Kanoe Namahoe | January 2014
Rollins College Tackles Network Security Issues With NAC Rollout
“Rollins College…used CounterACT to create a virtual firewall that allowed us to automatically notify users that their machine was compromised and to request they bring it to the help desk for remediation. This incident really opened my eyes to the power of CounterACT and its ability to enhance our security posture…Rollins College has been able to free up more than 100 man-hours of IT time per month.”

 

SVBJ
Silicon Valley Business Journal | Jon Xavier | January 2014
Ex-Symantec CEO Salem On Computer Security, Why Incumbents Can’t Keep Up, and The NSA
“Salem… thinks that the security industry is going through a fundamental shift, and the large incumbents are going to have a hard time keeping up….ForeScout is one of those companies that I think is moving IT forward. It’s the next generation of companies to bring the CSO and the IT team the opportunity to take control of the new environment.”

 

EMA-logo
EMA Reserch | David Monahan | January 2014
ForeScout Technologies Has a Knack for NAC with ControlFabric and CounterACT
“I am impressed by ForeScout’s solutions for a couple of reasons.CounterACT has great scalability. It addresses the needs of SMEs, small to medium enterprises, as well as having some of the largest NAC deployments, some of which exceed 800,000 devices…ControlFabric provides accelerated remediation by enabling an information exchange to more efficiently mitigate a wide variety of network, security and operational issues. A key factor in an optimized layered security model is that all of the layers must work cooperatively to provide the desired stronger defense…With the combination of these features, ForeScout demonstrates its leadership in the NAC space, delivering a highly competitive and extensible solution set with CounterACT and ControlFabric.”

 

TMCNet black white
TMC Net | Doug Barney | January 2014
Comings and Goings A Week in Review
“Enrique Salem has no plans to rest on his laurels, but instead just picked up a new gig on the board of directors forForeScout Technologies. Salem should know the ForeScout ropes as it, like Symantec, is in the network security business. He is also no stranger to being on boards, having also served that role for FireEye (News – Alert), Netskope, Atlassian, DocuSign and Biba.”

 

infosecurity1
Infosecurity | January 2014
SAP Combines MDM with NAC to Solve its Own Mobile Security Challenges
“For more effective endpoint and mobile security, it’s clear that IT security managers need a unified approach for consistent policy management, access control, compliance monitoring and reporting across all network tiers and endpoint devices. In the combined solution, ForeScout network access control (NAC) provides network visibility and control for IT managers; and SAP provides a way to implement and enforce mobile device policies.”

 

Itsecuritygurunews
IT Security Guru | Dan Raywood | January 2014
Benefits of Continuous Threat Monitoring
“Continuous monitoring is really about getting real-time visibility for everything that’s going on in your network. Additionally, it is about being able to share this context with other tools so that their policy engines can be enhanced with better context for their controls. Then allowing those tools to exchange information and even instruct tools such as our platform, CounterACT, to actually take dynamic mitigation for violations, exposures and threats. “

 

logo_CRN
CRN | Robert Westervelt | January 2014
Enrique Salem: Mobility, Cloud Ushering In A Changing Of The Guard
“Large security vendors with massive portfolios are struggling to keep pace with the rapid changes taking place at the endpoint and in the data center, according to former Symantec CEO Enrique Salem…who sits on the boards of networking security vendors FireEye and Forescout and cloud analytics and security firm Netskope, said a variety of agile startups are in position to address the issues faced by enterprises dealing with mobility issues at the endpoint…”

 

TMCNet black white
TMCnet | Matt Paulson | January 2014
Comings & Goings: Enrique Salem Joins ForeScout’s Board of Directors
“Salem has been in executive leadership positions and has worked on business strategies for over 25 years, so his experienced input will be highly valued by the rest of the ForeScout board…When Interviewed about his new position, Salem said that ForeScout’s network security platform delivers the visibility, control and interoperability necessary to optimize IT resources and evolve defenses. “

 

SiliconValleySanJoseBusinessJournal.com_logo
SVBJ | January 2014
Enrique Salem | People on the Move
“Has been named to ForeScout Technologies, Inc. Board of Directors…ForeScout’s network security platform delivers the visibility, control and interoperability necessary to optimize IT resources and evolve defenses, and Salem looks forward to working with the members and contributing to the company’s success.”

 

SJMN
San Jose Mercury News| January 2014
Enrique Salem, ForeScout Board
“Enrique Salem, former CEO of Symantec, brings 25+ years of executive leadership and business strategy to the ForeScout board of directors…Salem is also on the boards for FireEye, Netskope, Atlassian, DocuSign and Biba.”

 

Business Weekly_Uk
Business Weekly | Kate Sweeney | January 2014
Cambridge-Valley Tech Warriors Battle the Hackers
“Security technology warriors Bromium in Cambridge UK and ForeScout Technologies Inc in Silicon Valley have joined forces to provide unprecedented real-time defences against hack attacks…Based on CounterACT’s real-time visibility and policy-based mitigation capabilities, CounterACT can dynamically provision and activate the Bromium endpoint agent, vSentry.”

 

redseguridad
Red Seguridad | January 2014
ForeScout Continues as “Leading NAC” According to the Latest Gartner Quadrant
“Currently NAC vendors are beginning to differentiate their solutions through the numerous combinations with other products…ForeScout Technologies Inc…has been positioned as a “leader” according to the latest Gartner Magic Quadrant December 2013 for NAC.”

 

logo-up-sh
TradeArabia | January 2014
Westcon Inks ForeScout Distribution Deal
“Westcon will enhance its web security portfolio through ForeScout’s pervasive Network Access Control (NAC) security solutions and distribute these across the UAE, Saudi, Qatar, Oman, Kuwait, Bahrain, Egypt, Libya, Iraq, Lebanon, Jordan, Afghanistan, Pakistan and Yemen…Westcon will distribute the entire suite of ForeScout solutions, including the ForeScout CounterACT platform – along with extended integration modules for SIEM, MDM, vulnerability assessment, advanced threat detection and mobile security.”

 

pro_security_zone_logo
Pro Security Zone | January 2014
Gartner Accolade Consolidates ForeScout Position as NAC Leader
“According to the report, vendors in the field are starting to demonstrate differentiation through their ability to integrate with related technologies, a notion which is at the heart of the ForeScout CounterACT platform and ControlFabric architecture which are designed to enhance interoperability between disparate security solutions and serve as catalysts to address continuous monitoring and mitigation…Recent innovations in ForeScout’s CounterACT exemplify the company’s leadership in pervasive network security.”

 

sc_uk_logo
SC Magazine | Peter Stephenson | December 2013
2013 Industry Innovators: Access Control
“The big new thing from ForeScout this year is API and its new program/ecosystem. The company has written 66 integrations now and expects many other third-party vendors to join…Add to this a clear focus on bring-your-own-device (BYOD) and the idea of pervasive security throughout the enterprise and you have forward-looking thinking. ForeScout has traditionally been a NAC powerhouse. The experience and creativity that took it there has taken the company to the next level with the innovations of the past year”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | December 2013
ForeScout and Bromium Announce Integration
“Enterprises looking for more comprehensive, pervasive network and endpoint security will soon have another option to consider. Today, network security vendor and Gartner Network Access Control (NAC) market Magic Quadrant leader ForeScout and endpoint security startup and 2013 Gartner Cool Vendor Bromium announced an integration that the companies promise will take automated threat response to the next level.”

 

All About Security
All About Security | December 2013
Gord Boyce, CEO Interview
“Customers are demanding faster and more comprehensive information about all network assets and means by which they quickly understand whether these devices are properly configured, and whether they comply with the security policies…ForeScout Control Fabric is a technology that allows ForeScout CounterACT and other IT solutions to share information in order to treat a wide range of problems in network and endpoint security.”

 

networkworld
Network World | Jon Oltsik | December 2013
Enterprise Organizations Identify Incident Detection Weaknesses
“The issue here is that we don’t know what’s on our networks, and we don’t know the current state of what’s on our networks. Precisely why the Department of Homeland Security (DHS) set aside $6 billion for its Continuous Diagnostics and Mitigation (CDM) program…The contract also includes monitoring, scanning, log management, and SIEM vendors such as Core Impact, ForeScout, McAfee, nCircle, Rapid7, RedSeal, Veracode, Symantec, Splunk, and others.”

 

ehi-logo
E-Health Insider | December 2013
Security Share Stories
“Organisations looking at network security need to start by find out how many devices are connected to their networks…ForeScout’s customers include Sussex Health Informatics, which is using CounterACT to give it visibility and control of all the devices connecting to its COIN which covers 11 organisations and 40,000 staff…that software that enables that kind of visibility will be increasingly important as NHS organisations continue to merge and take over each other’s IT infrastructure while at the same time working with smaller budgets and smaller teams.”

 

softpedia_logo4a
SOFTPEDIA | Eduard Kovacs | December 2013
Bromium Teams with ForeScout to Fight Advanced Malware Attacks
“The integration between Bromium’s Live Attack Visualization and Analysis (LAVA) solution and ForeScout’s CounterACT can be leveraged for real-time intelligence gathering, and network-wide defenses capable of protecting enterprises against sophisticated threats…The two solutions work together…When Bromium’s LAVA detects a piece of advanced malware, it sends real-time information to ForeScout’s CounterACT, which automatically performs various actions. “

 

enterprisenetwork
Enterprise Networking Planet | Elizabeth Harrin | December 2013
5 Network Security Predictions for 2014
“Make sure your access policies are up-to-date and that you have a comprehensive, secure approach to network access control (NAC), BYOD, and endpoint encryption, including compulsory anti-malware protection on personal devices. New developments in the resurgent NAC market, such as ForeScout’s recently announced integration with endpoint security startup Bromium, provide innovative solutions.”

 

security-current
Security Current | Bob Tarzey | December 2013
Getting Real About Network Access Control (NAC)
“There is no silver bullet for achieving the often related goals of better security and compliance, but NAC is proving for many to be a key building block in their overall IT security architecture.”

 

CCJ
Cloud Computing Journal | Liz McMillan | December 2013
BYOD and Mobile Security Solutions
“SAP Global IT relies on SAP Afaria to manage over 55,000 mobile devices … The company also uses ForeScout CounterACT for network management. The two solutions work well together to accelerate provisioning, administration and security… and ensure that unmanaged devices are not allowed access to the SAP network.”

 

theGuardian
The Guardian | Stuart Dredge | December 2013
Managing the ‘BYOD’ Risk
“So-called Bring Your Own Device (BYOD) policies are an increasingly familiar part of the working world…ForeScout and Infosecurity Magazine, explored the risks of ‘rogue devices’… Rogue devices are a problem or an opportunity… BYOD is turning IT departments into more of an enabler and less of a controller.”

 

ITsecurityPro
IT Security Pro | December 2013
Friday Forum: How Queens College meshed CounterACT with FireEye
“Layered security can be a really great approach for IT organisations, but you will only see the true benefits from their investments if the different security layers are working together…Queens College needed better control over endpoint security in order to catch those few outliers that could be used as part of an advanced hacker’s chain of attacks against the college…In order to do that, he leveraged the ControlFabric interface to integrate CounterACT with FireEye’s advanced malware detection engine.”

 

BCW
Business Computing World | Robert McNutt | December 2013
The Evolution Of The Security Ecosystem
“Today, we see a wide variety of threats still targeting computer networks with each more advanced than the one before…By strategising security in the form of a platform and utilising an automated security control system, a truly secure and compliant network infrastructure can be maintained, and it can also leverage best of breed detection systems, enforcement mechanisms, management solutions and network infrastructure components.”

 

pro_security_zone_logo
Pro Security Zone | December 2013
Survey Results Show ROI Satisfaction on Network Access Control
“Customers who deployed the ForeScout CounterACT platform enjoyed a strong return on investment (ROI) and were highly satisfied with their CounterACT implementation. Of the respondents, 93 percent indicated the product overwhelmingly exceeded or met the ROI requirements, and 94 percent stated they were likely to recommend it to colleagues…Survey results pointed to critical security functions where CounterACT was highly differentiated against competitive solutions, including Cisco Identity Service Engine (ISE). Sixty-seven percent of respondents looked at Cisco solutions before selecting CounterACT.”

 

networkworld
Network World | Jon Oltsik | November 2013
Information Security Versus “Shadow IT”
“There is no denying that IT is getting harder to manage as a result of BYOD, cloud computing, IT consumerization, and mobility…When you can’t control everything, you better have tight control and oversight over what you have…Granular policy management is a major theme for Cisco (TrustSec, ISE, SDN, etc.) as well as Forescout…”

 

sc_uk_logo
SC Magazine | November 2013
2014 SC Awards U.S. Finalists: Round Three
Best NAC Solution – These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up to date…Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.”

 

WhaTech
WhaTech | November 2013
NAC Helping Secure Corporate Data in a World of BYOD
“Network access control is an aspect of computer security that has been around much longer than the BYOD phenomenon and all the issues thrown up by having mobile devices accessing corporate IT systems…BYOD is now the main driver of growth in the NAC market…Cisco Systems, ForeScout Technologies and Juniper networks accounting for 63 percent between them. “

 

sc_uk_logo
SC Magazine | November 2013
2014 SC Awards U.S. Finalists: Round Two
Best Enterprise Security Solution – This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry’s continued evolution.”

 

healthitsecurity
Health IT Security | Patrick Ouellette | November 2013
Addressing BYOD Security at a Large Medical Research Center
“Creating a BYOD program that is secure and sensible for all involved in a healthcare organization is difficult enough when the majority of users have similar responsibilities…University of Rochester Medical Center, currently secures and manages more than 15,000 devices all across three hospitals that are connected to the organization’s network…With Fore Scout, we can identify essentially every device on the network and what it’s running. We have a really good finger print of all of that and are getting to the point where we can force full disc encryption on a device prior to giving it network access. “

 

ZoneLogo
Pro Health Service Zone | November 2013
Policy based network access control for healthcare networks
“In healthcare, where patient care takes precedence, a secure network with no disruption to users and service is essential due to the time-critical nature of the industry. Furthermore, healthcare IT professionals face pressure to allow mobile and medical devices on the network, protect sensitive information and comply with industry regulations such as HIPAA…Offering a flexible and cost-effective approach, ForeScout Technologies’ network security solution, CounterACT, provides a comprehensive, easy-to-deploy solution to help healthcare networks gain complete visibility and control of every device.”

 

pro_security_zone_logo
Pro Security Zone | November 2013
Real Time Network Visibility for Wafer Test Service Company
“Ardentec, one of Taiwan’s wafer test service providers, has chosen ForeScout CounterACT to gain endpoint visibility and compliance via agentless monitoring and policy enforcement of nearly 4,000 endpoints used by more than 1,000 employees across its four manufacturing sites…Ardentec worked with InfoSource, a ForeScout distributor, to help it identify a network access control (NAC) solution that would allow it to fortify network security at all of its branch locations in order to reduce the risk of unauthorised and unsecured devices gaining access to the company network.”

 

TMCNet black white
TMCnet | Rahul Arora | November 2013
ForeScout CounterACT Selected by Ardentec
“CounterACT solution…will be used to gain endpoint visibility and compliance via agentless monitoring and policy enforcement of endpoints used by employees…’By using CounterACT as extensively as possible, not only did we improve our overall network security and visibility, but also the effectiveness of our endpoint security investments.’”

 

fiercehealthIT
Fierce Health IT | Ashley Gold | November 2013
Hospital Security Exec: BYOD Can Work at a Large Medical Research Center, If Done Right
“University of Rochester Medical Center…secures and manages more than 15,000 devices all across three hospitals connected to the organization’s network…”

 

Global-security-logo
Global Security Mag | Marc Jacob | November 2013
ForeScout CounterACT Helps Ardentec to Gain Real-time Network Visibility and Protection from Unauthorised and Unsecured Devices
“Ardentec worked with InfoSource, a ForeScout distributor, to help it identify a network access control (NAC) solution that would allow it to fortify network security at all of its branch locations in order to reduce the risk of unauthorised and unsecured devices gaining access to the company network…CounterACT’s effectiveness in providing increased operational insight and its low impact to their existing environment helped in Ardentec’s decision.”

 

GBFR
Global Banking  & Finance Review | November 2013
ForeScout Teams with SAP to Secure BYOD and Complete Enterprise Mobility
“The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise…The integration between ForeScout CounterACT and SAP Afaria MDM is provided via the ForeScout MDM Integration Module, which is an add-on to ForeScout CounterACT”

 

ITsecurityPro
IT Security Pro | November 2013
Friday Forum: The Evolution of the Security Ecosystem
“Today, we see a wide variety of threats still targeting computer networks with each more advanced than the one before…By strategising security in the form of a platform and utilising an automated security control system, a truly secure and compliant network infrastructure can be maintained, and it can also leverage best of breed detection systems, enforcement mechanisms, management solutions and network infrastructure components.”

 

forbes
Forbes | Dan Woods | October 2013
How to Choose the Right Eyes and Ears for Cybersecurity
“As the world moves forward toward a zero-trust model for network security, it will become even more important to understand who and what is connecting to your network and information. ForeScout is designed to provide real-time visibility and enforce endpoint and access security policies on a complex network that contains many different types of devices, from servers, to laptops, to mobile devices and virtual machines.”

 

Tech Target - logo image
Search Security | Shamus McGillicuddy | October 2013
ForeScout Adds Publish-and-Subscribe Security Integration to NAC
“There is a race to this publish-and-subscribe middleware for security…ControlFabric is based on the concept of “neural networks” where ForeScout lies as the center of the collective security intelligence network…pxGrid is more of a future strategy for Cisco, whereas ForeScout’s ControlFabric is available now.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | October 2013
ForeScout ControlFabric to Break Down Security Silos
“Network Access Control vendor ForeScout hopes to capitalize on this with the release of ControlFabric…enables enterprises to integrate security solutions, including MDM, Advanced Threat Detection (ATD), Security Information and Event Management (SIEM), endpoint protection, and vulnerability assessment, into CounterACT, enabling real-time, network-wide visibility into users, endpoints, and applications. “

 

networkworld
Network World | Ellen Messmer| October 2013
ForeScout Technology Encourages Security Management Info Sharing
“The new ControlFabric interface technology…lets CounterACT…share information it has related to an enterprise network with other security vendors…ControlFabric ‘represents a flexible approach to gain the context and policies necessary to advance endpoint compliance, continuous monitoring and security analytics.”

 

logo_CRN
CRN | Robert Westervelt | October 2013
NAC Vendors Have the Endpoint in Sight
“ForeScout Technologies is launching ControlFabric as well as an extended technology partner program for network access control, or NAC, integration this week… its platform allows system integrators and users to develop their own policies with multiple types of products, ranging from other security platforms to help-desk ticketing systems.”

 

infosecurity1
Infosecurity | October 2013
New Product Knits IT Security Silos Together
“ForeScout Technologies has rolled out the ControlFabric platform, which enables disparate IT security products from multiple vendors to dynamically share information, with analytics and other tools wrapped in to make it all actionable….By leveraging open standards, ForeScout’s ControlFabric platform offers a wealth of opportunity for ISVs, system integrators and customers to gain greater operational context and controls that advance an organization’s network security capabilities towards continuous compliance.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | October 2013
ForeScout Integrates with SAP Afaria for MDM Offering
“Network security solutions specialist ForeScout Technologies announced interoperability between the company’s CounterACT network security and SAP Afaria mobile device management (MDM) platforms…Through this integration, businesses can fortify a range of user, device, application and data policies though network-enforced controls, such as password strength, configuration, application use, encryption and data protection.”

 

TMCNet black white
TMCnet | Rajani Baburajan | October 2013
ForeScout, SAP Combine Network Access Control with Mobile Device Management to Secure BYOD
“The combination of ForeScout CounterACT and SAP Afaria aims to enable companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise…The pairing of network access control (NAC) with MDM allows enterprises to see and detect all unmanaged, corporate and personal mobile devices and apply security policies based on user, role and device to automatically limit access.”

 

All About Security
All About Security | October 2013
ForeScout Interoperability with SAP: Securing Enterprise Mobility and Expand BYOD
“ForeScout Technologies today announced the compatibility of ForeScout CounterACT network security with the mobile device management (MDM) platforms from SAP Afaria. The combination enables companies to accelerate the deployment, management and security of proprietary and personal mobile devices, applications and data.”

 

Security Insider
Security Insider | October 2013
ForeScout ControlFabric Platform
“With the new controlFabric platform, ForeScout infrastructure company data should be used to improve IT security easier. The integrated solution is using plug-ins, common network infrastructure, devices, directories, and system management products in the ForeScout CounterACT network security solution.”

 

GBFR
Global Banking  & Finance Review | October 2013
ForeScout Introduces New ControlFabric Technology Partner Program to Advance Network Security Capabilities Through Collaboration and Integration with Industry Leaders
“The ControlFabric Technology Partner Program allows ForeScout to further collaborate with industry-leading hardware and software vendors, examine ways to team their solutions with ForeScout CounterACT and deliver greater customer value…The two participation program levels, partner and gold, are determined by the level of commitment to the program and adoption by customers employing the integrated solution.”

 

ITsecurityPro
IT Security Pro | October 2013
ForeScout Opens the API Door with ControlFabric Technology
“Known as ControlFabric, the tech is billed as optimising network security and IT resources by delivering an open approach to dynamic visibility, intelligence and remediation…Commenting on the new technology, Fran Howarth, an analyst with Bloor Research, said that continuous monitoring in real time is an ever-increasing requirement.”

 

security manager
Security Manager | October 2013
The “Glue” Between Innovative SharePoint Products
“As hackers to enterprise systems are becoming faster and more innovative in attacks, companies need to continually improve their technology in order to respond adequately to refined, new attack techniques…. ForeScout’s solution works without agents and is able to report striking endpoints to all leading SIEM / SOC systems back.”

 

cbrnews
CBR | Ben Sullivan| October 2013
ForeScout Introduces the ContolFabric Platform
“The platform features new interfaces that open ForeScout CounterACT to developers, customers and system integrators, allowing them to ‘flexibly integrate CounterACT with other security and management systems.’…’Developed and proven over the last few years, the ForeScout ControlFabric platform allows customers to mobilise their enterprise tools and operational data in truly creative ways that dramatically improve visibility, risk management and productivity.’”

 

Security Insider
Security Insider | October 2013
ForeScout ControlFabric Platform
“With the new controlFabric platform, ForeScout infrastructure company data should be used to improve IT security easier. The integrated solution is using plug-ins, common network infrastructure, devices, directories, and system management products in the ForeScout CounterACT network security solution.”

 

Itsecuritygurunews
IT Security Guru | October 2013
Open Platform Launched by ForeScout
“ForeScout chief marketing officer Scott Gordon said that the ControlFabric technology was long in production and was part of the most recent version of CounterACT…’Now users can use this to send information in real time from the solution and any company can send to us for real time mitigation for an endpoint.’”

 

All About Security
All About Security | October 2013
ControlFabric – Promote Interoperability and Enable Continuous Monitoring and Troubleshooting
“ForeScout Control Fabric is an open platform…that exchanges information and other IT solutions and can defuse a wide range of security issues in networks and endpoints…’IT organizations need defense systems that are not only interoperable but also provide more benefits than the individual solutions for themselves. It’s about maximizing the ROI of people, processes and tools, “said Gord Boyce, CEO of ForeScout.’”

 

networkworld
Network World | Ellen Messmer| October 2013
Products of the Week 10.21.13
“ForeScout ControlFabric…is an open platform that enables ForeScout CounterACT and other IT solutions to dynamically exchange information and mitigate a wide variety of network and endpoint security concerns.”

 

IT Security Journal
IT Security Journal | Kim Borg | October 2013
ForeScout Debuts ControlFabric Platform to Improve Interoperability, Enable Continuous Monitoring and Mitigation
“Common defense-in-depth approach often yields silos of tools and plenty of data, which leave the security team to try and connect the dots…IT Security Journal reported about Cisco’s pxGrid framework a few months ago. Looks like ForeScout has thrown down the gauntlet with their ControlFabric platform.”

 

FInancialnews
Financial News | Gulli Arnason | October 2013
ForeScout Partners with SAP to Secure BYOD
“The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise.”

 

datensicherheit.de
Datensicherheit.de | Carsten Pinnow | October 2013
ForeScout Introduces ControlFabric Platform
“ForeScout Control Fabric is… an open platform to exchange information on ForeScout CounterACT and other IT solutions and can defuse a wide range of security issues in networks and endpoints. The platform supports companies through infrastructure data to raise situational awareness and policy-based controls to accelerate repair measures to improve the security status and also to automate routine tasks.”

 

GFM_news
GFM Nachrichten | October 2013
ForeScout Solutions and SAP Now Compatible
“The provider of comprehensive network security solutions, announced that its security platform is now compatible with SAP MDM platforms…In this way, companies can accelerate and enhance the deployment, management and security of company-owned and personal mobile devices, applications and data.”

 

TMCNet black white
TMC Net | Nathesh (Contributor) | October 2013
ForeScout Technologies Debuts ControlFabric Technology Partner Program
“By participating in the newly unveiled ControlFabric Technology Partner Program by ForeScout, developers and system integrators can learn about the means to enhance their network security capabilities…The company is also hoping to leverage this program to work together with major hardware and software vendors and identify the means to integrate the ForeScout CounterACT solution with…More than 30 technology partners, including new members Motorola, Palo Alto Networks and Splunk Inc. are said to be the working with ForeScout as part of this program.”

 

GBFR
Global Banking  & Finance Review | October 2013
ControlFabric – Gord Boyce, CEO of ForeScout
“Gord Boyce, CEO of ForeScout discusses ControlFabric platform, integration and CounterACT…The ControlFabric platform delivers interoperability for increased ROI.”

 

SiliconANGLE
SiliconANGLE | Mellisa Tolentino | October 2013
6 Mobile Security Solutions for BYOD
“IT administrators are up to their necks juggling mobile security solutions and infrastructure support to enable to BYOD movement, and there’s a slew of third party solutions looking to close the gap on IT and BYOD to smooth this rather abrupt transition into the mobile era…ForeScout offers three levels of BYOD security to fit a range of budgets, but the main foundation of its mobile security offering is the ForeScout CounterACT, which is a network-based appliance that works on PCs and mobile devices.”

 

1488.eweek_logo2
eWeek | Nathan Eddy | October 2013
ForeScout, Splunk Partner on Endpoint Visibility, Security
“ForeScout and Splunk…announced a technology partnership combining ForeScout’s dynamic endpoint visibility, access and security capabilities with Splunk Enterprise’s advanced machine data analytics expertise…’ForeScout CounterACT provides visibility to network and endpoint activity that our customers can use to augment their Splunk analytics in order to monitor for critical security issues and expedite investigations,’ Bill Gaylord, senior vice president of business development at Splunk, said in a statement.”

 

sc_uk_logo
SC Magazine | October 2013
CounterACT v7.1 Review: 5-Star Best Buy
“In preparation for our installation, ForeScout provided a hardware appliance (the CT 100 model) and a large amount of easy-to-read documentation. From unpacking the appliance to getting the system up and operational, it took under 30 minutes to start tracking data… This was a pleasing experience from beginning to end. Best Buy.”

 

1488.eweek_logo2
eWeek | Darryl K. Taft | October 2013
Technology Partnership with Splunk
“By combining ForeScout’s dynamic endpoint visibility, access and security capabilities with Splunk Enterprise’s advanced machine data analytics capabilities, enterprises gain enhanced threat insight and automated control, the company said…CounterACT helps organizations gain complete visibility for all devices, users, systems and applications attempting to connect to or on an enterprise network–wired or wireless, managed or unmanaged, PC or mobile”

 

Channel Marketer Report
Channel Marketer Report | October 2013
ForeScout Offers New ControlFabric Technology Partner Program
“ForeScout Technologies, a network security solutions provider, has unveiled the new ControlFabric Technology Partner Program, which aims to urge developers, system integrators and customers to integrate CounterACT with other security and management systems. The new program allows ForeScout to better collaborate with hardware and software vendors, and in turn, find ways ForeScout CounterACT can help ramp up partner solutions.”

 

pro_security_zone_logo
Pro Security Zone | October 2013
Secure Platform for IT Security Product Integration
“ForeScout Technologies has announced the ControlFabric platform to enable IT security products to dynamically share information and allow enterprises to more rapidly respond to a range of enterprise security and operational issues…The platform features new interfaces that open ForeScout CounterACT to developers, customers and system integrators, allowing them to flexibly integrate CounterACT with other security and management systems.”

 

Insurance_networking
Insurance Networking News | Jennifer Morrell | October 2013
ForeScout Partners With SAP on Enterprise Mobility Technology
“ForeScout adds that CounterACT and SAP Afaria offer the ability to see and detect all unmanaged, corporate and personal mobile devices, such as iPads, iPhones and Androids; readily apply security policy based on user, role and device; trigger SAP Afaria to profile check managed devices upon network resource request to detect jail-broken, rooted and non-compliant handhelds.”

 

help net security
Help Net Security | October 2013
ForeScout Partners With SAP on Enterprise Mobility Technology
“ForeScout Technologies announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise.”

 

VSR
Vertical Systems Reseller | October 2013
ForeScout Teams with SAP to Secure BYOD
“The integration between ForeScout CounterACT and SAP Afaria MDM is provided via the ForeScout MDM Integration Module, which is an add-on to ForeScout CounterACT, the company’s award-winning network security solution. ForeScout CounterACT is a real-time security solution that delivers complete visibility and automated control for all devices, users, systems and applications attempting to connect to or on an enterprise network – wired or wireless, managed or unmanaged, PC, VM, embedded or mobile.”

 

ChanneleBiz_Logo
ChannelBiz | Nick Booth | October 2013
ForeScout and SAP Combine to Claim Complete Enterprise Mobility
“Security vendor ForeScout Technologies has achieved interoperability between its CounterACT system and SAP’s Afaria mobile device management (MDM) platforms…Together CounterACT and Afaria promise to see and detect all unmanaged, corporate and personal mobile devices, such as iPads, iPhones and Androids as they come in over any network.”

 

Channelpartner.es
Channel Partner | October 2013
Ingecom Experienced a Growth of 12% in the Third Quarter
“Threat levels are increasing and solutions for access control are essential… ForeScout…NAC and MDM leader in its sector… is the first manufacturer to launch the new generation of NAC, also called EVAS (Endpoint Visibility Access and Security).”

 

networkworld
Network World | Ellen Messmer| September 2013
‘It’s a BYOD World’ – with a Catch — at New York Law School
“At New York Law School…BYOD security is enforced primarily through a ForeScout Technologies hardware appliance called CounterACT that can tackle network access control in an agentless fashion…Today, about 3,700 devices that students bring with them (Apple devices predominate) gain access to the network this way through CounterACT, which also watches to see if they might be bringing in malware.”

 

cbrnews
CBR | Amy-Jo Crowley| September 2013
ForeScout Teams Up with Splunk to Provide Security Solution
“ForeScout…will integrate its CounterACT solution with Splunk’s data analytics capabilities… CounterACT would send its already analysed data to Splunk, which analyses big data from websites, applications sensors and mobile devices, for further analysis… Scott Gordon, CMO at ForeScout, said IT decision makers are today face visibility and control gaps given the surge in network complexities, BYOD proliferation and sophisticated threats.”

 

channel prosmb
Channelpro SMB | September 2013
Thwarting Targeted, Zero-Day Attacks
“Continuous monitoring and mitigation technology requires a dynamic approach to ensure endpoint integrity, policy adherence, and security improvement…Network access control (NAC) helps IT gain a more dynamic and secure posture because it can identify and classify all network assets, and can assess the defense and compliance posture of all endpoints in real time, including mobile devices. “

 

Bloor
Bloor Research | Fran Haworth | September 2013
NAC Technologies Morphing Into Network Security Platforms
“Today’s NAC technologies interface directly with many other network security controls to ensure that all reports that they generate present a complete and accurate picture regarding all endpoints on the network…NAC technologies are evolving so fast that the term may disappear entirely in the not too distant future.”

 

CSO Resource for Security
CSO | John P. Mello Jr. | September 2013
APT Malware NetTraveler Learning New Tricks
“‘Patching systems, however, is a problem even for companies with a management system in place to do it, said Scott Gordon, CMO of ForeScout Technologies. That’s because the patching process can be gap prone. “We find that from five to 25 percent of operating environment where there’s change management and patching there’s a gap where the management system is saying one thing and the host configuration is not in parity,’ Gordon said in an interview.”

 

infosecurity1
Infosecurity | Bob Tarzey | September 2013
Network Access Control in the Real World
“At the Infosec Europe event in April this year, Quocirca chaired a panel session where three users of NAC from very different business sectors explained why they had invested in the technology, how it helps them overcome GRC challenges and better enables both BYOD and guest network access.”

 

Heise Resale
Heise Resale | September 2013
Resale Ticker: Louise Bulman New to ForeScout
“ForeScout Technologies strengthens its management team in Europe, the Middle East and Africa with Louise Bulman…Bulman takes over the post of vice president of EMEA sales…her extensive experience as a sales manager will allow ForeScout to implement its long-term business goals and industry in Greater Europe”

 

Universitybusiness
University Business | Matt Zalaznick | September 2013
Colleges Need Protection Beyond Antivirus
“The intensification of cyberattacks against universities and colleges means institutions need more than just clever passwords and the latest antivirus software to protect themselves from today’s more powerful hackers…ForeScout Technologies has a solution that can identify the security vulnerabilities of any device connected to an institution’s network and provide upgrades, says Scott Gordon, the company’s chief marketing officer.”

 

ITsecurityPro
IT Security Pro | September 2013
Friday Forum: How to Automate Device Network Interfacing
“Great by-product from this process is the ability to connect automatically to `headless’ devices on the network and provide them with the appropriate access…A headless device is any endpoint that does not have the ability to authenticate with entered credentials.For example, a printer does not connect to the network and allow an end user to enter in a login and password in order for the printer to gain network access.”

 

Report
Report | September 2013
Stop the Black and White Painting!
“Part of the BYOD indecision results from the fact that executives… look at the situation and ask themselves whether they should block the employee devices or allow them access…it is imperative to build some flexibility into the BYOD model by adding granularity to the access level based on the user, the device type, etc. Such an approach may also shift the type of technology needed to control the use of mobile devices. “

 

computerweekly
Computer Weekly | Bob Tarzey | September 2013
Network Access Control in the Real World
“There is an increasing need in many organizations to provide network access to guests (such as contractors and consultants) on an ad hoc basis. These two requirements have seen a resurgence of interest in network access control (NAC) systems from established vendors such as ForeScout…”

 

CSO Resource for Security
CSO | John P. Mello Jr. | August 2013
BYOD Security Challenges are Old Mortarboard for Universities
“While most universities have had their students use their own hardware for years, a big bump in corporate BYOD occurred in 2010 when tablets began to proliferate…Universities have always had students bring their own devices, but they have less control over those endpoints.”

 

Federal-Times
Federal Times | Nicole Johnson | August 2013
DHS Kicks Off $6B Cyber Program
“Agencies are trying to manage threats in real time…Key to that will be equipping agencies with both tools and experts through a $6 billion, five-year contract…Nearly a dozen of the 17 vendors DHS selected have included ForeScout’s offering as part of their wider suite of tools.”

 

networkworld
Network World | Ellen Messmer| August 2013
$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-time Monitoring to Feds
“The underlying goal of this massive “Continuous Diagnostics and Mitigation” (CDM) contract is to spur federal civilian agencies to move away from static approaches to network-security compliance reporting in favor of real-time monitoring…ForeScout, for example, said its CounterACT monitoring product has been included in product suites put forward by 11 out of the 17 systems integrators winning the contract.”

 

ITsecurityPro
IT Security Pro | August 2013
Friday Forum: The Art of Continuous Monitoring
“CounterACT discovers endpoint changes that might be undesirable, as well as suspicious and/or malicious behavior…By design, CounterACT is an intelligent security automation platform that uses its unique real-time visibility of all network endpoints and its interoperability with existing network security infrastructure to provide a redundant and scalable security solution.”

 

enterprisenetwork
Enterprise Networking Planet | Jude Chao | August 2013
NAC to Transform Into EVAS to Address BYOD Challenges
“EVAS goes beyond access control to encompass several other vital enterprise network security functions: real-time visibility and monitoring of all endpoints, including personal mobile devices; granular control of network access; and enhanced security capabilities, including policy enforcement and threat remediation… NAC market leader ForeScout welcomes the new category.”

 

networkworld
Network World | Jon Oltsik | August 2013
The Pressing Need to Improve Endpoint Visibility for Information Security
“When security analysts need up-to-the-minute information for critical remediation activities, they have to scramble around through a myriad of management systems to retrieve it. EVAS knows which mobile and PC endpoints are on the network at all times. EVAS knows the state of these assets (i.e. configurations, patches, ownership, applications, etc.).”

 

Channel Marketer Report
Channel Marketer Report | August 2013
ForeScout Named Key Solution Provider for Continuous Diagnostics and Mitigation Initiative
“The 17 selected federal systems integrators that received the award will offer government agencies sensors, risk-status displays and consulting services from contractors, the majority of which included ForeScout as a strategic component of their security solution, according to company officials…CounterACT will help federal agencies improve their cybersecurity posture through real-time asset discovery and policy-based remediation capabilities.”

 

Tech Target - logo image
Tech Target | James Fubush | August 2013
NAC Security Becoming Critical Infrastructure Component for BYOD
“The influx of employee-owned mobile devices, Software as a Service apps and other elements beyond IT’s control drive organizations to reevaluate their network access control security…’My experience with older NAC systems was they weren’t worth the hassle,’ said Nick Duda, principal information security engineer at Vistaprint…Vistaprint uses ForeScout’s CounterACT automated security control product to close the gaps where Microsoft’s SCCM has problems.”

 

TMCNet black white
TMC Net | Carolyn Dawson | August 2013
ESG Unveils Report on NAC’s Transformation Into EVAS Market
“Enterprise Research Group or ESG has unveiled a report “The Endpoint Visibility, Access, and Security (EVAS) Market: The Evolution of Network Access Control (NAC)…ForeScout ‘innovation and sales growth well supports ESG’s EVAS outlook, and more importantly, EVAS reflects how the majority of our enterprise and government customers use CounterACT daily to ensure a more secure network,’ said Gord Boyce, CEO of ForeScout Technologies”

 

ComputerWoche
Computerwoche | August 2013
BYOD Leads to Revival of NAC
” BYOD initiatives focus on allowing employees to access corporate data from personal devices such as tablets, smartphones and laptops…verify if your employees are going to use their LDAP (Active Directory, eDirectory, etc.) credentials to gain access to data on the corporate network or if pre-determined credentials that may be configured on the NAC appliance will be used for access. “

 

Next gov
Nextgov | Aliya Sternstein | August 2013
DHS Awards Contractors $6 Billion for Agency Network Surveillance
“The Homeland Security Department chose 17 vendors for a potential $6 billion network threat-monitoring project that will offer all civilian agencies the services at no cost to them…Each vendor will offer agencies a menu of sensors, risk-status displays and professional consulting services from subcontractors such as McAfee, ForeScout and Veracode”

 

Cloud Watch
Cloud Watch | August 2013
ForeScout Technologies to Expand in the Japanese Market
“ForeScout Technologies KK, a Japanese subsidiary of ForeScout, looks to increase services provided to existing partners, strengthening localized technical support, developing new customers through high-touch sales and partner engagement and strategically selecting new partners in key markets.”

 

Security Insider
Security Insider | August 2013
Modern GRC Strategies with Continuous Monitoring
“With the smorgasbord of compliance and governance mandates putting pressure on enterprises today, many companies have mapped tools and controls across industry and regulatory compliance frameworks to more efficiently institute governance, risk and compliance (IT-GRC) best practices.”

 

View Archived News Items »
http://www.mspmentor.net/2012/02/22/forescout-opens-platform-for-mobile-device-management-integration/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+MspMentor+%28MSP+Mentor%29