Possible Threat to President Obama’s Security Highlights Increased Need for Network Access Control
Cupertino, Calif. – March 2, 2009 – Forescout Technologies, a market leader in network access control (NAC) and policy management solutions for large enterprises, today announced that CounterACT is helping corporate enterprises and federal organizations protect against data theft over peer-to-peer pipelines.
“Yesterday’s news of how a military contractor unwittingly exposed blueprints for President Obama’s Marine One helicopter to a cyber thief in Iran, shows why – especially in mission critical networks – mandates against the download and use of peer-to-peer file-sharing programs must be actively enforced," said Gord Boyce, President of Forescout Technologies. "With CounterACT, any P2P program running on any IP device on your network can be automatically discovered, shutdown, and de-installed in real-time, with or without notification to the end-user.”
Peer-to-peer (P2P) file-sharing programs – typically used to exchange music files on-line – effectively allow worldwide access the user’s hard drive. This can lead to potentially serious security breaches, such as the one involving President Barack Obama’s Marine One helicopter, where engineering, financial and communications information about the helicopter – stolen from a defense contractor’s laptop over P2P – was traced to an IP address in Tehran, Iran.
CounterACT has the ability to see every IP device connected to the network, control all connections down to the switch port, and provide complex policies to enable and enforce security processes and standards. Access control is performed without the need to first deploy 802.1x, and enforcements can include actions such as peer-to-peer shutdown, post-connection monitoring for threat prevention, and detection/blocking of banned devices (such as USBs).
In addition, Forescout CounterACT’s unique ActiveResponse technology is specifically designed to stop threats from within, well before the network is compromised. By focusing on proven attacker intent, CounterACT can block attackers before they gain access to the network without the need for signatures, deep-packet inspection or manual intervention.
“As we saw with this most recent federal data theft, organizations must be prepared to defend their network against cyber espionage by detecting and eliminating the kinds of applications that are prone to data leaks," said Boyce. “Forescout CounterACT is able to control access and protect the network … both inside and out, ensuring that only the right people with the right authorization gain access to the right network resources at all times.”
About Forescout Technologies, Inc.
Forescout is the leading provider of access control and compliance solutions. With top-tier customers from every vertical, Forescout has perfected the art of providing strong access control without disrupting network operations or needlessly punishing end users. Forescout’s flagship product, CounterACT, protects over 500 of the world’s most secure enterprises and military installations with global deployments spanning 37 countries. The CounterACT family of products provides a path to complete security policy enforcement and is fast and easy for administrators to deploy, manage and maintain. For more about the company and its products, visit www.forescout.com.