Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1
Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout Technologies, Page 2 2014 ForeScout Technologies, Page 2
Foundation In business 13 years Campbell, CA headquarters 200+ global channel partners 2013 ForeScout Technologies, Page 3 2014 ForeScout Technologies, Page 3
#1 Foundation Market Leadership Focus: Pervasive Network Security Independent Network Access Control (NAC) Market Leader 2013 ForeScout Technologies, Page 4 2014 ForeScout Technologies, Page 4
#1 Foundation Market Leadership Enterprise Deployments 1,500+ customers worldwide Financial services, government, healthcare, manufacturing, retail, education From 500 to >500,000 endpoints 2013 ForeScout Technologies, Page 5 2014 ForeScout Technologies, Page 5
*Magic Quadrant for Network Access Control, December 2013, Gartner Inc. **NAC Competitive Landscape April 2013, Frost & Sullivan **Frost & Sullivan 2013 report NC91-74, Analysis of the Network Access Control Market: Evolving Business Practices and Technologies Rejuvenate Market Growth Chard base year 2012. *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Garnter, Inc. "Magic Quadrant for Network Access Control," Report G00249599, December 12, 2013, Lawrence Orans. 2013 ForeScout Technologies, Page 6 2014 ForeScout Technologies, Page 6
Inadequate visibility to risks on the network 2013 ForeScout Technologies, Page 7 2014 ForeScout Technologies, Page 7
2013 ForeScout Technologies, Page 8 2014 ForeScout Technologies, Page 8
2013 ForeScout Technologies, Page 9 2014 ForeScout Technologies, Page 9
Transient Devices BYOD Devices Broken Managed Devices 2013 ForeScout Technologies, Page 10 2014 ForeScout Technologies, Page 10
Corporate Resources Non-corporate Endpoints Network Devices Applications Antivirus out of date Unauthorized application Agents not installed or not running Users VISIBLE NOT VISIBLE 2013 ForeScout Technologies, Page 11 2014 ForeScout Technologies, Page 11
Real-time Visibility + Coordinated Controls Switches SIEM Ticketing Remediation MDM Endpoint Security AAA Systems Management Vulnerability Wireless 2013 ForeScout Technologies, Page 12 2014 ForeScout Technologies, Page 12
Complete Situational Awareness 2013 ForeScout Technologies, Page 13 2014 ForeScout Technologies, Page 13
Who are you? Who owns your device? What type of device? Is your device compliant? Do you require mitigation? Employee Partner Guest Corporation BYOD Windows Mac ios Android Printer Configuration Software Security Agents OS Software SSID Certificate ForeScout Advanced Policy Engine Out-of-the-box templates Flexible and extensible Alerting Onboarding Remediation Network Access Control 2013 ForeScout Technologies, Page 14 2014 ForeScout Technologies, Page 14
Security Gateway GRC AAA SIEM NGFW / VPN VA/DLP 2013 ForeScout Technologies, Page 15 2014 ForeScout Technologies, Page 15 System Management Host Controls MDM / MAM
Continuous Visibility Endpoint Mitigation Endpoint Authentication & Inspection Network Enforcement Information Integration 2013 ForeScout Technologies, Page 16 2014 ForeScout Technologies, Page 16
DATA CONSUMERS CounterACT DATA PROVIDERS ControlFabric Interface Web API SQL LDAP Syslog Console Policy Engine Reporting Dashboard Network Devices Endpoints 2013 ForeScout Technologies, Page 17 2014 ForeScout Technologies, Page 17
Legacy Next Gen Fixed Environment Dynamic Environment Silo d, Disjointed Tools Integrated Tools Wish of a Self-Defending Network Delivering Self-Defending Network 2013 ForeScout Technologies, Page 18 2014 ForeScout Technologies, Page 18
Enhance security and preempt threats Enable secure mobility and BYOD Achieve higher ROI on existing tools Improve IT productivity through automation 2013 ForeScout Technologies, Page 19 2014 ForeScout Technologies, Page 19
Pervasive Network Security an IT Game Changer 2013 ForeScout Technologies, Page 20 2014 ForeScout Technologies, Page 20
2013 ForeScout Technologies, Page 21 2014 ForeScout Technologies, Page 21 Thank You