How To Improve Your Network Security



Similar documents
Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Embracing Complete BYOD Security with MDM and NAC

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

ForeScout CounterACT. Continuous Monitoring and Mitigation

Mobile device Management mit NAC

ForeScout MDM Enterprise

The ForeScout Difference

Securing BYOD With Network Access Control, a Case Study

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Technical Note. ForeScout MDM Data Security

ControlFabric Interop Demo Guide

AirWatch Solution Overview

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

INSERT COMPANY LOGO HERE

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Delivering Control with Context Across the Extended Network

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Whitepaper. Securing Visitor Access through Network Access Control Technology

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

How To Buy Nitro Security

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Whitepaper. A Blueprint for Pervasive Network Security. How to accelerate continuous visibility, control intelligence, and policy-based response.

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

Gartner Magic Quadrant Sources and Disclaimer

Technical Note. ForeScout CounterACT: Virtual Firewall

Average annual cost of security incidents

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ForeScout CounterACT Endpoint Compliance

Mobile First Era with MobileIron. MobileIron Japan

Mobilize your Enterprise in 60 Minutes!

How To Manage A Privileged Account Management

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

Strategic Road Map for Network Access Control

Network Access Control in Virtual Environments. Technical Note

Technical Note. CounterACT: 802.1X and Network Access Control

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Symantec Mobile Management Suite

Solve BYOD with! Workspace as a Service!

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

We Manage Mobility. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances

Network Control Meets Endpoint Security

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Meraki: Introduction to Cloud Networking

Next Gen Firewall and UTM Buyers Guide

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

Cisco Mobile Collaboration Management Service

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

How to Choose the Right Security Information and Event Management (SIEM) Solution

6 Things To Think About Before Implementing BYOD

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Comprehensive Device Management Platform comprising of Management Suites specialized in addressing different problem domains, extensively

Going Beyond Mobile Device Management - Leveraging NAC for Mobile Devices

Top 10 Reasons why VDI is not a good solution for BYOD

Jits Langedijk Sr. Consultant

Chris Boykin VP of Professional Services

BYOD Networks for Kommuner

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

Web Security Gateway Solutions

Optymyze Sales Performance Software

Readiness Assessments: Vital to Secure Mobility

Mobile Device Strategy

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

FROM PRODUCT TO PLATFORM

Reducing the cost and complexity of endpoint management

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

WhatWorks in Blocking Network-based Attacks with ForeScout s CounterACT. Automating Network Access, Endpoint Compliance and Threat Management Controls

ForeScout Technologies Is A Leader Among Network Access Control Vendors

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

MobileIron and Samsung Value Proposition

RFI Template for Enterprise MDM Solutions

IBM Security Intelligence Strategy

ClearPass: Understanding BYOD and today s evolving network access security requirements

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

IBM Endpoint Manager for Mobile Devices

MarketsandMarkets. Publisher Sample

Symantec Client Management Suite 8.0

Transcription:

Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1

Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout Technologies, Page 2 2014 ForeScout Technologies, Page 2

Foundation In business 13 years Campbell, CA headquarters 200+ global channel partners 2013 ForeScout Technologies, Page 3 2014 ForeScout Technologies, Page 3

#1 Foundation Market Leadership Focus: Pervasive Network Security Independent Network Access Control (NAC) Market Leader 2013 ForeScout Technologies, Page 4 2014 ForeScout Technologies, Page 4

#1 Foundation Market Leadership Enterprise Deployments 1,500+ customers worldwide Financial services, government, healthcare, manufacturing, retail, education From 500 to >500,000 endpoints 2013 ForeScout Technologies, Page 5 2014 ForeScout Technologies, Page 5

*Magic Quadrant for Network Access Control, December 2013, Gartner Inc. **NAC Competitive Landscape April 2013, Frost & Sullivan **Frost & Sullivan 2013 report NC91-74, Analysis of the Network Access Control Market: Evolving Business Practices and Technologies Rejuvenate Market Growth Chard base year 2012. *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Garnter, Inc. "Magic Quadrant for Network Access Control," Report G00249599, December 12, 2013, Lawrence Orans. 2013 ForeScout Technologies, Page 6 2014 ForeScout Technologies, Page 6

Inadequate visibility to risks on the network 2013 ForeScout Technologies, Page 7 2014 ForeScout Technologies, Page 7

2013 ForeScout Technologies, Page 8 2014 ForeScout Technologies, Page 8

2013 ForeScout Technologies, Page 9 2014 ForeScout Technologies, Page 9

Transient Devices BYOD Devices Broken Managed Devices 2013 ForeScout Technologies, Page 10 2014 ForeScout Technologies, Page 10

Corporate Resources Non-corporate Endpoints Network Devices Applications Antivirus out of date Unauthorized application Agents not installed or not running Users VISIBLE NOT VISIBLE 2013 ForeScout Technologies, Page 11 2014 ForeScout Technologies, Page 11

Real-time Visibility + Coordinated Controls Switches SIEM Ticketing Remediation MDM Endpoint Security AAA Systems Management Vulnerability Wireless 2013 ForeScout Technologies, Page 12 2014 ForeScout Technologies, Page 12

Complete Situational Awareness 2013 ForeScout Technologies, Page 13 2014 ForeScout Technologies, Page 13

Who are you? Who owns your device? What type of device? Is your device compliant? Do you require mitigation? Employee Partner Guest Corporation BYOD Windows Mac ios Android Printer Configuration Software Security Agents OS Software SSID Certificate ForeScout Advanced Policy Engine Out-of-the-box templates Flexible and extensible Alerting Onboarding Remediation Network Access Control 2013 ForeScout Technologies, Page 14 2014 ForeScout Technologies, Page 14

Security Gateway GRC AAA SIEM NGFW / VPN VA/DLP 2013 ForeScout Technologies, Page 15 2014 ForeScout Technologies, Page 15 System Management Host Controls MDM / MAM

Continuous Visibility Endpoint Mitigation Endpoint Authentication & Inspection Network Enforcement Information Integration 2013 ForeScout Technologies, Page 16 2014 ForeScout Technologies, Page 16

DATA CONSUMERS CounterACT DATA PROVIDERS ControlFabric Interface Web API SQL LDAP Syslog Console Policy Engine Reporting Dashboard Network Devices Endpoints 2013 ForeScout Technologies, Page 17 2014 ForeScout Technologies, Page 17

Legacy Next Gen Fixed Environment Dynamic Environment Silo d, Disjointed Tools Integrated Tools Wish of a Self-Defending Network Delivering Self-Defending Network 2013 ForeScout Technologies, Page 18 2014 ForeScout Technologies, Page 18

Enhance security and preempt threats Enable secure mobility and BYOD Achieve higher ROI on existing tools Improve IT productivity through automation 2013 ForeScout Technologies, Page 19 2014 ForeScout Technologies, Page 19

Pervasive Network Security an IT Game Changer 2013 ForeScout Technologies, Page 20 2014 ForeScout Technologies, Page 20

2013 ForeScout Technologies, Page 21 2014 ForeScout Technologies, Page 21 Thank You