After the initial build out of Comply to Connect (C2C) at the Marine Corps Base Camp in Lejeune, North Carolina (See Part 1 of Notes from the Military), the concept and process was demonstrated to other Marine Corps bases as well as representatives of the Army, Airforce, Navy, Coast Guard, and the Defense Information Systems Agency (DISA). It was a moment everyone had been waiting for. How would C2C compare with other network security solutions? All the reps present were able to see C2C perform in real time. Within 45 seconds a workstation was turned on and every step in the process – according to the Marine Corp’s predefined security policies – was completed and network access granted to the user.
A second use case included a scenario in which a host-based security system was not installed, C2C automatically detected this, installed a HBSS, validated connectivity to the server and granted access. Other use cases and tests demonstrated workstations that could not correctly install patches, i.e. the test user was not authenticated or allowed; viruses were present, and more.
There was no competition. Amongst the multiple vendor solutions demoed – all emphasizing network access control, end point management, orchestration, and reporting – C2C was the only solution that orchestrated flawlessly in every use case scenario that day. As a result, elements of it were subsequently integrated into numerous DISA Command Cyber Readiness Inspection preparations at multiple bases – the comprehensive network inspection is aimed at improving the security of the Department of Defense Information Network.
Forescout’s C2C provides real-time, agentless control of the assets on your network, implementing continuous diagnostics and mitigation countermeasures that safeguard your agency’s information systems. For more information, here’s a webinar discussing C2C, as well as a Fireside chat with my colleague Dean Hullings.