Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots.

Government

Securely Enable Government with Zero Trust Security Capabilities

International governments face the sophisticated threats in today’s digitized world. From national defense and critical infrastructure protection to protecting citizens’ private data and more, government entities are attractive targets for exploitation. Forescout provides governments with zero trust security capabilities to better secure their IT, OT/ICS and IoT networks.

Cybersecurity for Government Agencies

Cybersecurity Capabilities for Government Agencies

The Forescout Continuum Platform helps keep government operations available, secure and compliant. Forescout helps government IT and security professionals protect data, secure access to government resources and demonstrate compliance for federal agencies and other public-sector entities, providing a multi-layered defense capability and helping keep citizens’ daily lives free from disruption. Forescout has a rich history of working with government agencies at every level and is a primary technology in major federal programs such as Continuous Diagnostics and Mitigation (CDM) and Comply to Connect.

Access control

Enforce a zero trust security architecture and limit access to information, services and applications resources through policy.

Compliance

Continuously monitor for the presence of required software, unauthorized software, rogue devices, configuration changes, etc.

Incident response

Understand all connected devices, including unmanaged and rogue devices, to determine impact of known vulnerabilities and automate mitigation response (block, patch, etc.), saving labor and reducing time to repair.

Software inventory

Identify un- or under-utilized software for cost savings or consolidation and remove outdated software that poses increased threat from legacy vulnerabilities.

Supply chain

Gain introspection into running embedded software and applications on managed and unmanaged devices.

Government Cybersecurity

Continuous Diagnostics and Mitigation (CDM)

Identify and Mitigate Risk through the CDM Program

The Forescout Continuum Platform can serve as the centerpiece of your CDM solution by helping you:

  • Mitigate vulnerabilities and quickly respond to incidents with automated, real-time visibility of endpoints as they connect to your network.
  • Establish a real-time inventory of devices, hardware, operating systems, applications, patch levels, open ports, peripheral devices, users and more.
  • Limit network access to authorized users and devices with or without 802.1X.
  • Assess the security and compliance posture of endpoints in real time, both pre- and post-connection.
  • Automate remediation of noncompliant endpoints by auto-updating endpoint configurations, patches and updates, and install, activate, or disabling applications or peripherals.
  • Produce real-time compliance reports and shorten detection interval latency (DIL) by initiating compliance scans as hosts connect, rather than waiting for time-based scans.

Comply-to-Connect

Knowing all of the devices on the DoD’s Information Network, or DODIN, has always been a challenge. And if they don’t know that a device is connected, they can’t defend it or the information on it. Comply-to-Connect, or C2C, is changing all of that.

NIST Cybersecurity Framework

Enforce a unified network security policy to address the NIST Cybersecurity Framework family of controls, including:

Access control

Detect all IP-based endpoints on the network, including unmanaged devices, IoT, rogue devices; assess their cybersecurity posture; and enforce access policies to the network and within network segments.

Configuration management

Maintain consistent configurations across the enterprise; maintain and control deviations from configuration policies; and enforce "least functionality" by identifying and removing unnecessary or insecure software.

Assessment, authorization and monitoring

Establish continuous monitoring to track system-level metrics and inform risk-based decisions.

Supply chain (New in NIST 800-53 Rev 5)

Identify and segment critical systems components for tracking through the supply chain.

Government Programs

U.S. Government Certifications

Trust a solution with the highest levels of military-grade and government security certifications

Forescout has achieved the following U.S. Government certifications and compliances:

  • National Information Assurance Partnership (NIAP) Common Criteria Certification
  • U.S. Department of Defense Information Network Approved Products List ( DoDIN APL) (Search Forescout)
  • FIPS (Federal Information Processing Standards) 140-2
  • USGv6 Tested and Certified for IPv6
  • Authority to Operate (ATO) from Multiple DoD Services and Programs
  • U.S. Army CoN (Certificate of Networthiness)

U.S. Government Contract Vehicles

Ease procurement of U.S. Government contracts

The Forescout platform is available through authorized Resellers and Distributors by the U.S. Government on the following contracts and purchasing schedules:

  • GSA Schedules (aka Multiple Award Schedules and Federal Supply Schedules)
  • NASA SEWP (Solutions for Enterprise-Wide Procurement) GWAC (Government-Wide Acquisition Contract)
  • ITES/2H (Managed and used by U.S. Army. Also used by DoD and other federal agencies)
  • Encore II (Managed by DISA, Defense Information Systems Agency)
  • Enterprise Software Initiative Blanket Purchase Agreement (ESI BPA) (managed by NIWC Pacific)
  • Various State and Local contracts (NY OGS, TX DIR, SC, NC, CA SLP)

UK NCSC 10 Steps to Cyber Security

Achieve Compliance with NCSC’s Top 10 Steps to Cyber Security

The United Kingdom’s National Cyber Security Centre (NCSC) provides10 Steps to Cyber Security as guidance to help medium to large organisations better understand and mitigate their cyber risk. Either natively or by coordinating automated actions among security tools, the Forescout Continuum Platform supports this guidance by extending scarce IT and InfoSec resources with continuous, automated asset management, risk compliance, network segmentation, network access control and security orchestration across all connected assets, going above and beyond baseline security recommendations to provide a strong foundation for zero trust.

LEARN MORE


Australian Essential Eight Maturity Model Compliance

Achieve Maturity Level 3 with all Essential Eight controls

The Australian Cyber Security Centre’s (ACSC’s) Essential Eight Maturity Model is a set of mitigation strategies designed to improve cybersecurity posture by making it hard for adversaries to compromise networks. With three maturity levels, even organisations with scarce IT resources can achieve baseline compliance and protection from increasing cyber threats. And with continuous visibility, compliance assessment and automated workflows using the equipment and security tools you already have, your network can adapt to your ever-changing digital terrain.

The Essential Eight is a set of mitigation strategies, not a single solution or technology that can be bought through a single vendor. They address three areas that require not only different security tools but tight communication and coordinated actions. Either natively or by coordinating automated actions among security tools, Forescout enables you to achieve Maturity Level Three for all eight controls, with continuous visibility into granular compliance status.

 

LEARN MORE

 


Canadian Centre for Cyber Security Top 10 IT Security Actions

Achieve Compliance with all Top 10 IT Security Actions

The Canadian Centre for Cyber Security maintains a list of the Top 10 IT security actions it recommends organizations take to protect connected networks and information1. The Forescout Continuum Platform extends scarce resources with continuous, automated asset management, risk compliance, network segmentation, network access control and security orchestration across all assets – cloud, IT, IoT, IoMT and OT/ICS – going above and beyond baseline security recommendations to provide a strong foundation for zero trust.

 

LEARN MORE


Government Customer Confidence

Government Cybersecurity Related Resources

Solution Brief Icon   Solution Brief

Government Solution Brief

Download
Blog Icon   Blog

Using Zero Trust to Prevent Agency Ransomware Attacks

Read More
Datasheet Icon   Datasheet

Canadian Centre for Cyber Security Top 10 IT Security Actions

Download
Datasheet Icon   Datasheet

Essential Eight Compliance with Forescout

Download
Solution Brief Icon   Solution Brief

Forescout Extended Modules for Federal Civilian Agencies

Download
Solution Brief Icon   Solution Brief

Identify and Mitigate Risk through the CDM Program

Download
White Paper Icon   White Paper

Achieving Comply-to-Connect Requirements with the Forescout Platform

Download
Solution Brief Icon   Solution Brief

Addressing NIST Security Controls with Forescout

Download
eBook Icon   eBook

How to Align with the NIST Cybersecurity Framework

Download

Request a Government Cybersecurity Demo

Get a personalized tour of our solutions and see how we can help you automate cybersecurity across your digital terrain.

Request a Demo

Take a Test Drive

Embark on a 90-minute, hands-on tour of Forescout, covering device visibility, asset management, incident response and network segmentation.

Schedule a Test Drive