Control access by students, faculty, administration, and guests to maintain security and privacy.
IDC Connect: 2014 Cyber Defense Maturity Report for U.S., U.K. & DACH. Download »
Frost & Sullivan Report: "Continuous Compliance and Next Generation NAC"
ESG Report: Optimizing
ForeScout CounterACT Platform Brochure.
ForeScout White Paper: Blueprint for Continuous Monitoring & Mitigation Download »
ControlFabric Technologies Brochure.
ForeScout Company Overview
Gartner Report: "Magic Quadrant for Network Access Control"
CSO Mag Continuous Monitoring Video
Watch Now »
Golden West College
ForeScout CounterACT helps educational institutions ensure network security, compliance, and guest network access.
Network security is difficult for any enterprise, but educational institutions face a unique set of challenges including:
When students arrive on campus, their laptops may be infected with malware and have risky applications like P2P already installed. They may totally lack antivirus software. Students can also bring networking gear from home – wireless access points and wiring hubs – and try to connect it to the campus network.
Illegal file sharing and downloads of copyrighted material was officially criminalized under the 1998 Digital Millennium Copyright Act (DMCA) and later reinforced under the Higher Education Opportunity Act of 2008. Although liability limitations exist for network administrators, Section 512 of the DMCA indicates that if subpoenaed, they must disclose the identity of the offending subscriber. They must also terminate accounts of repeat offenders.
ForeScout CounterACT is an automated security control platform that delivers real-time visibility and control of devices on your network. CounterACT provides network access control (NAC), endpoint compliance, handheld device security and threat control, in one automated system.
ForeScout CounterACT lets you enforce security requirements for endpoints. If the laptop has no anti-virus, CounterACT lets you install anti-virus to the student system, or point the student to where he can purchase his own anti-virus.
After the student’s laptop is connected to your network, CounterACT will continuously monitor the behavior of the laptop for signs of infection or malicious activity. If danger is detected, CounterACT gives you a wide range of controls to help deal with the situation.
CounterACT can also immediately detect and block any rogue devices such as wireless access points and unauthorized wiring hubs. CounterACT gives you detailed visibility into any equipment connecting to the network, including its physical location.
ForeScout CounterACT can separate students, staff, faculty and guests at the network level. A number of different technologies can be deployed to create and maintain these “Chinese walls” including VLANs, access control lists, and virtual firewalls. See more here.
ForeScout Counter ACT can also detect whether P2P applications are installed and/or running. CounterACT gives you a range of control options to deal with P2P such as:
ForeScout CounterACT includes a built-in automated process which allows guests to register for access to your network.
ForeScout CounterACT will limit network access depending on who the user is – student, administrator, faculty, guest, or other roles as defined within our directory or the CounterACT policy engine. Once the role has been defined, CounterACT can limit network access to
If you wish, ForeScout CounterACT can inspect each guest user’s device to ensure that it is compliant with your security policies prior to allowing it onto your network.
Once CounterACT admits an endpoint onto your network, CounterACT continuously monitors the endpoint to ensure that it remains compliant with your security policies and uninfected.
ForeScout CounterACT can automatically remediate endpoint security deficiencies. CounterACT includes a wide spectrum of remediation options which lets you tailor the action to fit the severity of the incidence:
ForeScout Compliance Center helps end-users self-remediate problems on their PCs by indicating what is wrong and how to fix it
ForeScout CounterACT contains a patented threat-detection engine that protects your network from zero-day threats and infected systems. Our unique technology does not require signature updates or other forms of maintenance. ForeScout CounterACT provided zero-day protection even against the notorious Conficker and Zeus Trojans.
ForeScout CounterACT lets you monitor who is running forbidden applications such as P2P, or using USB memory sticks, etc. Send users who are violating policies just-in-time notifications, including an auditable acknowledgement that the user has read the security policy that they just violated. Optionally disable or kill prohibited devices or processes.
See who has been on your network, which days, and where they were.
The information generated by ForeScout CounterACT can be exported to your other IT management systems. Integrations are available for most leading SIEM systems, and customers can build custom integrations with the Open Integration Module.
Click image to enlarge.
Webinars and Webcasts