Breaches reported Annual number of data breaches Average annual cost of security incidents Among companies with revenues over $1 billion Regulatory mandates 900 800 700 600 500 400 300 200 100 0 2011 2012 2013 2014 $3.9 million 2013 $5.9 million 2014 SOX HIPAA NERC PCI NIST HITECH Source: Identity Theft Resource Center Source: 2015 Global State of Information Security Survey, PwC 2015 ForeScout Technologies, Page 2
The Home Depot 53 million email addresses and 56 million credit cards Attackers used stolen vendor credential to access critical systems 21m government employees identities stolen OPM did not maintain a comprehensive inventory of servers, databases and network devices Cyber attack could cost as much as $100 million Disabled the antivirus in the target machines without detection 80m customer records stolen Suspicious administrator activity went unnoticed for months Attackers exploit 76 Million Households vulnerable affected endpoints, easily Hackers move took over across a remote server big the bank failed to properly update flat networks 44 percent of known breaches came from vulnerabilities that 11m customers medical are 2 to and 4 years financial old data stolen HP Cyber Risk Report 2015 Premera s network security procedures were inadequate 2015 ForeScout Technologies, Page 3
Less than 10% of new devices connecting to the corporate environment will be manageable through traditional methods Number of unmanaged devices is exploding By 2020: 20+ Billion Unmanaged Connected Devices Dec 2014: Within two years, 90% of all IT networks will have an IoT-based security breach Unmanaged Devices 2010 2012 2014 2016 2018 2020 Managed Devices Source: Gartner, BI Intelligence, Verizon, ForeScout 2015 ForeScout Technologies, Page 4
Fragmented security lets attackers in FIREWALL SIEM ATD VA ENDPOINT PATCH EMM Security products are silos. Human beings are needed to compensate for Average lack of automation. time to contain a cyber attack is 31 days SecOps teams are overwhelmed and cannot respond in timely fashion. 70 to 90 percent of all malicious incidents could have been prevented or found sooner if existing logs and alerts had been monitored Verizon Data Breach Investigations Report Ponemon Institute 2014 Global Report on the Cost of Cyber Crime 2015 ForeScout Technologies, Page 5
ForeScout Solution 2015 ForeScout Technologies, Page 6
Managed Unmanaged Agentless Continuous Computing Devices DIRECTORIES PATCH SIEM Devices Applications Antivirus out-of-date Vulnerability Broken agent ATD VA EMM IoT Visible with OTHER Visible Not Visible 2015 ForeScout Technologies, Page 7
Policy-driven Automated Users Endpoints Existing IT 2015 ForeScout Technologies, Page 8
Share context Automate workflows ControlFabric Open APIs 2015 ForeScout Technologies, Page 9
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 10
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 11
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 12
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices Rogue Devices 2015 ForeScout Technologies, Page 13
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices 2015 ForeScout Technologies, Page 14
1 See corporate, BYOD, IoT, rogue devices. FIREWALL SIEM ATD VA ENDPOINT PATCH EMM 2 Control network access based on user, device, policy Internet 3 Find and fix vulnerabilities and security problems on managed endpoints Directories 4 Detect transient devices and trigger real-time vulnerability scans Infrastructure 5 6 Automate enrollment for guests and BYOD including mobile devices Rapidly respond to incidents, without human intervention BYOD Devices Managed Devices IoT Devices 2015 ForeScout Technologies, Page 15
Real-time visibility No gaps No agents Broad range of responses User Endpoint Existing IT systems Information sharing and automation Reduce security fragmentation Speed incident response 2015 ForeScout Technologies, Page 16
2015 ForeScout Technologies, Page 17