Locate and Remove Prohibited Devices
Quickly identify prohibited devices such as Kaspersky, Huawei and ZTE that pose security risks.
Comply-to-Connect: The Basis for Cybersecurity
The cybersecurity challenges facing government agencies are more complex than ever and demand comprehensive solutions capable of securing networks, devices and data.
There’s one thing universal among all government agencies.
It’s the necessity to continuously improve security and prove compliance. Forescout helps government agencies at the federal, state and municipal levels meet the numerous access control and continuous endpoint compliance requirements with an agentless, easy-to-deploy and scalable solution.
How Forescout Helps
Local, state and federal government agencies are prime targets for hackers, whether politically motivated, seeking information they can sell, or simply engaged in mischief. By providing secure network access for a wide range of devices and user populations, the Forescout platform helps government agencies protect their confidential data and support their compliance efforts with mandated policies and regulations such as FISMA, NERC, ISO/IEC 27001 and the GDPR. Forescout can:
Government Solution Brief
As cyberthreats increase in numbers and effectiveness, government agencies must rethink how to eliminate intrusions, protect sensitive information and mitigate exposure to cyberattacks.
“Forescout improved the visibility into what was connected to the network and helped enforce security policies on devices.”
Modern and smart cities face constant threats as new types of devices expand the attack surface of their networks. Forescout offers unique capabilities, including agentless visibility, to address these formidable challenges. Our solutions deploy quickly, without disrupting users, work with new and existing infrastructure and enhance the effectiveness of tools public sector IT teams already use. Equally important, they scale to meet the incredible growth needs of smart cities, with proven deployments in customer networks exceeding 1,000,000 endpoints.
NIST RMF (Risk Management Framework)
Enforce a unified network security policy to address NIST RMF requirements
Forescout CounterACT® helps you proactively enforce a unified network security policy to address National Institute for Standards and Technology (NIST) RMF requirements in three key ways:
*As of December 31, 2016
CONTINUOUS DIAGNOSTICS AND MITIGATION (CDM)
The Department of Defense has thousands of networks, each with many more thousands of connected devices like PCs and servers as well as connected systems such as HVAC controls, security sensors, and cameras. Knowing all of the devices on the DoD’s Information Network, or DODIN, has always been a challenge, especially since they are transient. In other words, they connect, drop off, then re-connect on a routine basis. Staying on top of all that activity, while optimizing both security and availability, is a challenge. And if they don’t know that a device is connected, they can’t defend it or the information on it. Comply to Connect, or ‘C2C,’ is going changing all of that.
Host-Based Security System (HBSS)
Help ensure protection through automated detection and remediation of endpoints with missing or broken HBSS agents
CounterACT integrates directly with network infrastructure to provide a real-time view of devices on DoD networks. With CounterACT, you can:
Assured Compliance Assessment Solution (ACAS)
Gain mission-critical visibility, control and scalability to power ACAS capabilities
CounterACT integrates directly with the Tenable® Nessus® Vulnerability Scanner and SecurityCenter to provide a robust ACAS solution. CounterACT:
Command Cyber Readiness Inspections (CCRI)
Comply with CCRI Guidelines
Forescout offers a policy-based security platform for endpoint compliance automation that can help DoD IT organizations create, monitor and enforce endpoint security policies in accordance with DISA STIGs and CJCSI directives with minimal effort. CounterACT identifies devices that are noncompliant with HBSS or ACAS even when those devices are entirely unknown. CounterACT automates endpoint compliance controls through:
CCRI Solution BriefRead the Brief
Discover and support smartphones, tablets and laptops to offer secure, compliant wireless access
CounterACT supports 802.1X and non-802.X authentication mechanisms, allowing workers and contractors in the public sector to securely access network resources using managed and personal mobile devices. CounterACT:
U.S. GOVERNMENT CERTIFICATIONS
Trust a solution with the highest levels of military-grade and government security certifications
Forescout has achieved the following U.S. Government certifications and compliances:
U.S. GOVERNMENT CONTRACT VEHICLES
Ease procurement of U.S. Government contracts
CounterACT is authorized by the U.S. Government on the following contracts and purchasing schedules:
COMMAND CYBER READINESS INSPECTION (CCRI)
Improve your CCRI Score with the Forescout platform
The Forescout Visibility Platform helps improve all three components of your CCRI score.
Executive Summary Command Cyber Readiness InspectionRead
Quantify the ROI of your Visibility and Control
Improve your CCRI Score with the Forescout platform
In just 10 minutes we’ll help benchmark and analyze your opportunities for device and network security improvements
Get Your Personal AssessmentRead