ForeScout MDM Enterprise



Similar documents
The ForeScout Difference

Embracing Complete BYOD Security with MDM and NAC

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Total Enterprise Mobility. Norbert Elek

Mobile Device Management for CFAES

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Cisco Mobile Collaboration Management Service

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec Mobile Management 7.2

Technical Note. ForeScout MDM Data Security

Symantec Mobile Management 7.1

Symantec Mobile Management Suite

Total Enterprise Mobility

Symantec Mobile Management for Configuration Manager 7.2

M a as3 6 0 fo r M o bile D evice s

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.1

Advanced Configuration Steps

Whitepaper. Securing Visitor Access through Network Access Control Technology

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Unified Windows Device Management in the Enterprise

IBM United States Software Announcement , dated February 3, 2015

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

How To Improve Your Network Security

Mobile First Government

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Addressing NIST and DOD Requirements for Mobile Device Management

What We Do: Simplify Enterprise Mobility

Kaspersky Security for Mobile

Network Access Control in Virtual Environments. Technical Note

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

AirWatch Solution Overview

Systems Manager Cloud Based Mobile Device Management

ForeScout CounterACT. Continuous Monitoring and Mitigation

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

RFI Template for Enterprise MDM Solutions

Secure, Centralized, Simple

ControlFabric Interop Demo Guide

Bell Mobile Device Management (MDM)

McAfee Enterprise Mobility Management

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Feature List for Kaspersky Security for Mobile

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Windows Phone 8.1 in the Enterprise

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Chris Boykin VP of Professional Services

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

How To Secure Your Mobile Device

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

IT Resource Management & Mobile Data Protection vs. User Empowerment

Guideline on Safe BYOD Management

IBM Endpoint Manager for Mobile Devices

Systems Manager Cloud-Based Enterprise Mobility Management

How To Manage A Mobile Device Management (Mdm) Solution

Securing BYOD With Network Access Control, a Case Study

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

How To Write A Mobile Device Policy

MDM and beyond: Rethinking mobile security in a BYOD world

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

MAM - Mobile Application Management

IT Resource Management vs. User Empowerment

Kony Mobile Application Management (MAM)

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

Securing Office 365 with MobileIron

Good for Enterprise Good Dynamics

11 Best Practices for Mobile Device Management (MDM)

Symantec Mobile Security

6 Things To Think About Before Implementing BYOD

Cloud Services MDM. ios User Guide

When enterprise mobility strategies are discussed, security is usually one of the first topics

IT Enterprise Services

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

The User is Evolving. July 12, 2011

CHOOSING AN MDM PLATFORM

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Transcription:

Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify unauthorized or non-compliant Identify mobile without password protection Identify mobile that are missing required apps, for example, management or security apps Send messages to mobile users Work with ForeScout CounterACT to block or limit network access based on who, what, when, where, and how secure the device is Unified network access policy management and reporting of all endpoint on the network regardless of user, device ownership, device type, connection method, or location Identify and block malicious activity Benefits Improved visibility across all mobile connected to your network Enhanced security against non-compliant Operational efficiency with automated enrollment ForeScout ForeScout is the fastest and most comprehensive way to configure for enterprise access and secure corporate data on smartphones and tablets all from a single screen. ForeScout is an easy to use platform that includes all of the essential functionality for end-to-end management of ios, Android, Windows Phone, and BlackBerry. ForeScout is powered by MaaS60, a powerful cloud-based technology used by over 000 organizations around the world to secure over 1 million mobile, and named Leader in the Gartner Magic Quadrant for MDM Software and Winner of the 201 SIIA CODiE Award for Best Mobile Device Application for Enterprises................................................................................................... Total Endpoint Policy Management With the explosion of handheld mobile, we are all hurtling toward a post PC world in which employees will be carrying various mobile, some owned by them, some owned by the company. This new paradigm of computing is challenging our existing paradigms of network security, data security, and device security. Wouldn t it be nice if, instead of implementing new security silos that are limited to mobile, you could extend your PC and network security systems to encompass mobile? With a single unified security management and reporting system, you would be confident that your network is secure regardless of what type of device a user may be carrying a PC, a Mac, a smartphone or tablet. You would minimize costs and administrative overhead. That future is today. ForeScout ForeScout, powered by MaaS60, includes all of the essential functionality that you need for end-to-end management of ios, Android, Windows Phone, and Blackberry. And what s better is that it integrates with ForeScout CounterACT, our flagship network security and policy automation system, to give you unified visibility and control over everything on your network. ForeScout is a cloud-based solution, so deployment is quick and easy. In just a few clicks, IT can start enrolling and managing the entire mobile device lifecycle, from enrollment to security, monitoring, application management and support. Together with ForeScout CounterACT, ForeScout provides a whole new level of centralized visibility and control for actionable insights into your entire computing landscape. Secure All Mobile Devices: ForeScout supports all major smartphone and tablet platforms including ios, Android, Windows Phone, and BlackBerry in both Exchange and Lotus Notes environments. Embrace BYOD: ForeScout provides workflows to discover, enroll, manage and report on personally owned as part of your mobile device operations. Experience Simple Device Enrollment and Approval: ForeScout provides auto-quarantine for Exchange, and alerts IT personnel to approve all new. Additionally it provides for easy user self-enrollment via web, email or SMS.

Enterprises must be prepared to manage and secure a wide range of, some of which they don t own. Multiplatform MDM tools are one way to achieve this. Gartner, Top 10 Mobile Technologies for 2012 and 201, 14 February 2012, Nick Jones No matter what [BYOD] strategy is selected, the ability to detect when unmanaged are in use for business purposes will be required and that requires NAC. Gartner, NAC Strategies for Supporting BYOD Environments, 22 December 2011, Lawrence Orans and John Pescatore How ForeScout Works With an intuitive interface and easy to use workflows, ForeScout enables you to support the entire mobility lifecycle from enrollment to configuration management, compliance, security, app and document management, along with help desk support. Provision: ForeScout streamlines the configuration and device enrollment process using SMS, email or a custom URL to make life simple for IT and mobile employees. Device enrollment takes just minutes. When combined with ForeScout CounterACT, provisioning is highly automated for any new device that accesses the network. Users can be authenticated over the network using Active Directory/LDAP, using a one-time passcode, or with SAML. Integrate: With ForeScout Cloud Extender, you can securely integrate with all major email, calendar and contacts platforms including Exchange, Lotus Notes, and Microsoft Office 65, plus Active Directory and any required Certificate Authorities. Manage: OTA configuration management provides simple delivery and maintenance of corporate device profiles, including Wi-Fi and VPN settings. Create custom groups for granular management. Define role-based administrative portal access rights. Decommission by removing corporate data and MDM control (see Figure 1). Secure: ForeScout provides dynamic, end-to-end security and compliance management. Enforcement of passcode policies and strong encryption keys protects sensitive business and personal data on mobile. Through real-time compliance management, ForeScout can detect when users opt out of your MDM program, install prohibited applications, jailbreak/root their mobile, or initiate SIM changes. Take automated actions such as messaging the user, blocking email, wiping corporate data from the device, or removing it from the network. Monitor: ForeScout provides integrated reporting and analytics to provide a high level view into your mobile device landscape across your enterprise with detailed hardware and software inventory reports, plus configuration and vulnerability details. Mobility Intelligence dashboards deliver an interactive, graphical summary of your mobile device operations and compliance. Support: ForeScout provides robust help desk capabilities for support procedures such as locating a device with GPS, resetting a user s passcode, and sending a direct message to a device. ForeScout also provides an end-user support portal that allows users to do basic self-management of their device, such as wiping or resetting the password on a lost device. Application Management: ForeScout lets you have your own centrally managed Application Catalog of approved or recommended public applications and in-house developed applications. Within the catalog users can instantly view apps available to them, install apps, and be alerted to update apps. IT administrators can set policies for blacklisted, whitelisted and required apps (see Figure 2). Expense Management: ForeScout enables organizations to set corporate-wide expense policies, and to proactively monitor and track mobile data and application usage. This lets you optimize your mobile spend and shift the accountability to business units and/or individual employees.

ForeScout Figure 4: Secure email allows employees to collaborate with colleges without risk of data leak. Figure 1: OTA confirguration management provides visibility and control over mobile. Figure 5: Mobile Application Security let s you integrate full security management. Figure 2: Enterprise allows you to centrally manage applications. Figure : Distribute documents securely to mobile. Figure 6: Set secure browser policies for users.

Combine NAC and mobile device management (MDM) to enforce policies in a BYOD environment. Personally owned that are not managed by MDM agents should be limited to Internet access only, or placed in a limited access zone where they can access a subset of applications and network resources as per user/group role. Recommendation from the Gartner Case Study Document Management: ForeScout lets you distribute business documents to users of mobile while providing total manageability and control. Each document can have its own security policy, including required authentication, share restriction and time-based expiration, and be distributed to all users, selected groups, or individual. Documents are distributed to the ForeScout Document Catalog on mobile, which is an encrypted document container that provides complete security, including data loss prevention controls and protection from unauthorized distribution. Integrate with content in SharePoint or Box, or leverage the MaaS60 Doc Cloud, a globally optimized distribution network which reduces network load and increases scalability and performance (see Figure ). Secure Mail: ForeScout delivers a secure office productivity app with email, calendar and contacts to allow employees to securely collaborate with colleagues while preserving the mobile experience on their personal. This addresses key concerns of data loss risks. Through authentication and authorization, only approved, valid users can access sensitive emails and data. With policies for data leak prevention, you can restrict sharing by users, forwarding of attachments and copying and pasting of email text. Devices that are lost, stolen or compromised can be selectively wiped to remove the secure email container, all attachments and profiles (see Figure 4). Mobile Application Security: Using our simple application wrapper or Software Development Kit (SDK), you can secure in-house applications with a mobile application container. You can integrate full security management including enforcing authentication and data leak prevention controls, such as restricting copy, paste, and cloud data backups. Device compliance checks can be enforced prior to launching a secured application and real-time alerts can be sent to the administrator when compliance violations occur. Provision app-level tunnels for secure access to corporate data without needing a device VPN (see Figure 5). Secure Document Sharing: ForeScout not only enables users to view content, but create, edit and save content securely on-the-go, all in an encrypted container. The secure office productivity app works with all common file types including Word, Excel, PowerPoint, and text formats. Users can seamlessly access and share content via Secure Mail, MaaS60 Doc Cloud and corporate file shares (e.g., SharePoint, Box). Secure Browser: ForeScout includes a Secure Browser app which reduces the vulnerability your mobile have to risky websites that may contain malware, violate HR policies, or simply waste your users precious time. The Secure Browser blocks known malware and malicious websites using a scanning engine and reputation database. IT administrators can specify categories of web content that are blocked, for example social networking sites, download sites, and explicit sites. Send custom text or HTML notifications to users when they try to access a prohibited URL. Redirect users to a specific URL when policies are violated. Alert administrators in real time when users try to access forbidden sites. Optionally disable native or third party browsers. Setup secure access to corporate intranet sites and enterprise networks with no VPN required (see Figure 6).

The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete security solution for the following reasons: 1. MDM systems can only see and manage that have already been enrolled in the MDM system. 2. MDM systems typically do not control access to the network.. MDM systems are often operated as another management silo, with another set of reports. Through a simple plug-in module, ForeScout integrates with ForeScout CounterACT, our flagship network access control and security automation product. Once integrated, you will obtain many valuable synergies: Automated real-time detection of mobile the moment they try to connect to your network, including unmanaged and unknown. Improved security by blocking unauthorized users and from the network. Unified compliance reporting for all endpoint PCs, smartphones, and tablets. Automated installation of MDM agents by directing unmanaged to an installation web page. Unified network access control policy enforcement options. Allow compliant and managed onto the network. Limit network access based on device type, ownership, time of day, and compliance. Block non-compliant, or certain types of, from your network completely. Guest registration for personal mobile that are not owned by employees. Once a guest has registered and been approved, ForeScout CounterACT can restrict the user s access to just the Internet. Continuous protection. If malware on a mobile device tries to propagate or interrogate your network, ForeScout CounterACT will block the threat, and remove the device from your network. Visibility NAC Alone MDM Alone NAC + MDM Basic OS info on all Full info on managed only Complete Network Access Control Complete No Complete Mobile Device Compliance Very limited Complete Complete Agent Deployment Network based Pre-registration Both Figure 7: NAC + MDM = Complete security.

Device Support ios version 4. and higher Android version 2.2 and higher BlackBerry Enterprise Server (BES) version 5.0 and higher Windows Phone 7.5 and 8 when integrated with Exchange ActiveSync and Lotus Traveler Figure 8: ForeScout MDM integration scope and coverage. Take the ForeScout Challenge Let us know which ForeScout solution is right for you, and we ll arrange a free on-site evaluation..................................................................................................................................................... About ForeScout ForeScout delivers pervasive network security by allowing organizations to continuously monitor and mitigate security exposures and cyberattacks. The company s CounterACT platform dynamically identifies and assesses all network users, endpoints and applications to provide complete visibility, intelligence and policy-based remediation of security faults. Because ForeScout s pervasive network security solution is easy to deploy, unobtrusive, open and scalable, it has been chosen by more than 1,500 enterprises and government agencies. Headquartered in Campbell, California, ForeScout offers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com...................................................................................................................................................... ForeScout Technologies, Inc. 900 E. Hamilton Ave., Suite 00 Campbell, CA 95008 U.S.A. T 1-866-77-8771 (US) T 1-408-21-191 (Intl.) F 1-408-21-228 (Intl.) www.forescout.com 201 ForeScout Technologies, Inc. Products protected by US Patent #6,6,489, March 2002. All rights reserved. ForeScout Technologies, the ForeScout logo and ForeScout Mobile are trademarks of ForeScout Technologies, Inc. All other trademarks are the property of their respective owners. Doc: 201.0020-W