Meritrust Credit Union
Financial institutions choose ForeScout to strengthen network control
ForeScout helps financial institutions protect confidential data, demonstrate compliance with regulations, and prepare for IT audits in a cost-effective, efficient manner.
If you are responsible for IT security at a financial institution, you face several unique challenges due to the amount of sensitive data on your network:
The Business Challenge
- Preserve customer trust by protecting data privacy
- Demonstrate regulatory and security policy compliance
- Improve security posture while reducing total cost of ownership
- Control access to confidential data
- Measure effectiveness of security controls
- Guard against targeted malware threats
Traditional network security focuses on blocking external attacks with firewalls and intrusion prevention systems (IPS). But today, almost all serious data loss events occur from the inside. Can zero-day attacks and advanced persistent threats scan your network to glean information? Can rogue wireless access points extend your network without your knowledge?
Traditional endpoint security systems (e.g. antivirus, personal firewalls, patch management and encryption) are also important. Is every one of your security systems 100% deployed and operational? Unaware of their blind spots, agent-based systems typically over-report their own level of deployment, often by 10% to 15%. In spite of your best efforts, you probably have a gap in protection, and you’re not getting the protection you paid for.
Numerous financial institutions use ForeScout CounterACT to protect their networks, measure compliance with security policies, and save money.
ForeScout CounterACT is an automated security control platform that delivers real-time visibility and control of devices on your network. CounterACT provides pervasive network security by delivering network access control, endpoint compliance, handheld device security and threat control, all in one automated system.
ForeScout CounterACT reduces the risk of data breaches and malware attacks that would otherwise put your business at risk. And it helps monitor and improve the effectiveness of your security policies, so you can demonstrate compliance with industry regulations such as PCI DSS, SOX, GLBA, FINRA, BASEL II and more.
The features which make ForeScout CounterACT uniquely suited to address the challenges of financial institutions are:
- Automatically detect connected systems, user, applications and peripheral devices
- Monitor devices before and after they connect to your network, continuously
- Detect hidden infrastructure such as unauthorized wiring hubs and rogue wireless access points.
- Gain deep visibility into connected systems – type of device, operating system, patch level, location, applications, and user name.
Network Access Control
- Quickly create and enforce access control policies with a range of alerting, remediation and enforcement options
- Disable rogue wireless access points
- Block unknown computers from accessing sensitive portions of your network.
- Grant network access based on the user’s identity and the roles that you have defined in your directory.
- Apply network access policies that allow only authorized users to access the parts of your network with sensitive data.
- Detect and disable rogue USB devices to prevent loss of financial data
- Control who uses P2P applications, smart phones, etc.
- Ensure that endpoints are compliant with your security policies – antivirus, DLP, encryption, patch level, configuration, etc.
- Identify and fix non-compliant devices without user involvement
- Measure compliance with internal policies, helping you prove compliance with regulations like PCI DSS, SOX, GLBA, FINRA, SEC 17a-14, BASEL II and more.
- Create on-demand or scheduled reports for management and audit
- All ForeScout products include ActiveResponse™ technology which blocks both known and unknown attacks with accuracy. This unique technology does not require signature updates or other forms of maintenance, so it requires zero maintenance. And since ActiveResponse does not suffer from false positives, you can confidently activate ForeScout’s threat prevention system inside your network in full blocking mode. ForeScout products provided zero-day protection against Conficker and Zeus.
- ControlFabric Integration. Information generated by ForeScout CounterACT can be exported to your existing GRC, reporting systems, and other IT security systems. Integrations are available for most leading security products, and end-users can build custom integrations with the Open Integration Module.
ForeScout CounterACT’s unique security automation gives you an unbeatable combination of improved security, cost savings, and productivity gains.
- Reduce risk of infection by ensuring that endpoints are properly configured, antivirus is properly running and updated, vulnerabilities are patched, and the latest versions of software is installed.
- Reduce risk of data loss by ensuring that encryption and DLP agents are running properly. Ensure that users are not able to run unauthorized applications or peripheral devices (e.g. USB memory sticks).
- Reduce risk of the unknown. Detect and monitor use of unmanaged devices such as smartphones, tablets, USB interfaces, and printers.
- Reduce IT support costs. Large financial services institutions have reported savings of approximately $1 million per year with ForeScout CounterACT.
- Avoid penalties of lost data. A secure network, with secure endpoints, is less likely to lose data. Avoid the regulatory fines and devastating impact to your corporate reputation.
- Extend the life of your firewalls. ForeScout’s ActiveResponse™ IPS technology is extremely scalable and requires very little processor overhead. Installing CounterACT Edge in front of your traditional signature-based IPS systems and firewalls (which are very processor-intensive) will reduce the load on these systems and extend their useful lives.
- ForeScout’s advanced automation operates without the need for manual intervention by IT administrators or users.
- Realtime data and reports show you problems on your network right now, letting you take action while the problem still exists.
- By improving your endpoint security posture, you will suffer fewer infections and avoid time-consuming drills to repair infected workstations
- Unlike simplistic products that disrupt users with heavy-handed security controls, ForeScout CounterACT offers a full spectrum of enforcement actions ranging from gentle (notifications) to assertive (update software or kill processes). The range of enforcement actions helps you be more successful by working with users, not against them.
Low cost of ownership
- Unlike traditional agent-based security systems, ForeScout CounterACT is a simple appliance that installs on your network. It requires no software installation. It can be deployed and functioning in one afternoon.
- Lowest TCO of any NAC solution on the market
- Vendor-neutral, infrastructure-independence eliminates need for expensive upgrades and prevents vendor lock-in
- Unlike traditional agent-based security systems, ForeScout CounterACT allows you to enforce security policies on devices on your network–known and unknown, managed and unmanaged, corporate and personal.
- ForeScout CounterACT works with what you have–your existing switches, routers, firewalls, endpoints, patch management systems, antivirus systems, directories, ticketing systems. We take what you have and make it better.
- ForeScout CounterACT provides useful results on Day 1 by giving you visibility to problems on your network. The built-in knowledge base helps you configure security policies quickly and accurately.
Reduce information silos
Your existing security and IT management systems have valuable information. By leveraging the ControlFabric ecosystem, you can break down these silos of information, better leverage your infrastructure investments, and optimize your IT resources.
Click image to enlarge.
Windows PC inventory with missing updates
ForeScout CounterACT shows you in realtime which PCs on your network contain vulnerabilities.
Virtual Client-unauthorized changes
ForeScout CounterACT can identify unauthorized changes to PC configurations or software.
ForeScout CounterACT shows you which PCs are running unauthorized processes.
Unapproved Network WiFi device
ForeScout CounterACT identifies rogue WiFi devices.
Kill peer-to-peer user experience
ForeScout CounterACT lets you kill unauthorized software, keeping endpoint systems in compliance with your security policies.
Webinars and Webcasts