SlideShare a Scribd company logo
1 of 30
Download to read offline
Automated Security Control
John Hagerty – EMEA Sales Director
ForeScout Overview

ForeScout is a leading provider of automated security
control solutions for Fortune 1000 enterprises and
government organizations.
• Founded in 2000
• HQ Cupertino California, R&D Tel Aviv Israel
• 44% year-over-year growth
   – Leading independent vendor of Network Access Control
   – #2 market share behind Cisco
• Global deployments
   – Multiple vertical industries
   – Very large deployments (>200,000 endpoints)
• Global Support – ‗Follow the sun‘
Gartner Leader - December 2011

• A consistent record of growing faster than the      ―Magic Quadrant for Network Access Control‖,
                                                          December 8, 2011; Lawrence Orans and
  NAC market, and proven ability to win large deals                  John Pescatore; Gartner, Inc.

• The highest visibility among pure-play NAC
  vendors, particularly in the government and
  financial sectors

• Strong marks for scalability, with some of the
  largest active deployments of all vendors

• Clientless approach that eases the support for a
  wide variety of endpoints, particularly in BYOD
  environments

• Users continue to cite ease of deployment and
  flexible enforcement methods as a primary
  selection criteria
Customers and Their Requirements
The Challenge:
    Balance Access Agility With Security


•   Employees, Guests,                           •   Data loss
    Contractors                      Security    •   Zero-day attacks
•   Smartphones and                                  and malware
    personal devices
                                                 •   Endpoint integrity
•   Wireless, wired,
                                                 •   Regulations and
    VPN
                         Access                      compliance
                         Agility


Requires real-time,                             Requires real-time,
 comprehensive                                  automated controls
     visibility
Large Customers in Each Product Segment
         • Total purchases: $4.6M - Endpoint Compliance Customer
         • Primary use: Manage endpoint compliance
         • Secondary use: Block unauthorized users


         • Total purchases: $9.8M - Network Access Control (NAC) Customer
         • Primary use: Block unauthorized users (per DISA requirement)
         • Secondary use: Enforce policies (no USB memory sticks, etc.)


         • Total purchases: $2.4M - Endpoint Compliance Mobile Security Customer
         • Primary use: Visibility, compliance reporting and automated endpoint remediation
         • Secondary use: Mobile security, enabling‖ Bring Your Own Computer to Work‖

         •   Total purchases: $3.8M - Threat Protection, Endpoint Compliance, and NAC Customer
         •   Primary use: Segment network (federated organization)
         •   Secondary use: Block attacks, remediate endpoints, register guests


         • Total purchases: $1.2M - Mobile Security Customer
         • Primary use: Protecting and managing mobile consumer device
CounterACT – How It Works
Limited Visibility Means Security Gaps

                         Corporate Resources                                 Non-Corporate




      Endpoints



Network Devices

                                         Antivirus out of date
    Applications                         Firewall installed but turned off
                                         Encryption agent not installed



         Users

                          ForeScout Comprehensive Visibility
                   Protection Possible
                        Visible                    No Protection Possible
                                                        Not Visible
ForeScout Provides Visibility and Control


                            Network                      Endpoint
       Mobile            Access Control                 Compliance                     Threat
       Control               • Register guests          • Find and fix                 Control
                             • Limit access               security gaps
   • Detect and report       • Block unauthorized       • Enforce policies         • Block intrusions
     on mobile devices         users and rogue          • Track violations           and worms
   • Restrict access           devices                                             • Detect infected
                                                                                     machines




                 Agentless                                                      Scalable
                         ForeScout Automated Security
                               Control Platform
            Knowledgebase                           .                        Interoperable
How It Works


• Out of band     Deploy at the Core
                                        ForeScout
• Clientless                           CounterACT
• One appliance
See Grant Fix Protect

                               ForeScout
   •   What type of device?   CounterACT
   •   Who owns it?
   •   Who is logged in?
   •   What applications?




(((((((
See Grant Fix Protect

                             ForeScout
   •   Grant access         CounterACT
   •   Register guests
   •   Block access
   •   Restrict access




(((((((
See Grant Fix Protect




                                        Web   Email   CRM


                                Sales


                         Employee


                        Guest
See Grant Fix Protect

                               ForeScout
•   Remediate OS              CounterACT
•   Fix security agents
•   Fix configuration
•   Start/stop applications
•   Disable peripheral
Blocked Admission and Advised What is
Out of Compliance
See Grant Fix Protect

                                  ForeScout
•   Detect unexpected behavior   CounterACT
•   Block insider attack
•   Block worms
•   Block intrusions
See Grant Fix Protect



   ALERT & REMEDIATE                      RESTRICT ACCESS                                  MOVE & DISABLE
Open trouble ticket                  Deploy a Virtual Firewall around an infected   Reassign device from production VLAN to
                                     or non-compliant device                        quarantine VLAN
Send email notification
                                                                                    Block access with 802.1X
SNMP Traps
                                     Reassign the device into a VLAN with           Alter login credentials to block access
                                     restricted access
Syslog
                                                                                    Block access with device authentication
HTTP browser hijack
                                     Update access lists (ACLs) on switches,        Turn off switch port (802.1X or SNMP)
Auditable end-user acknowledgement   firewalls and routers to restrict access
                                                                                    Terminate unauthorized applications
Self-remediation
                                     Automatically move device to a pre-
Integrate with SMS, WSUS, SCCM,      configured guest network                       Disable peripheral device
Lumension, BigFix
ForeScout & the IT-GRC Framework

Switches & Routers   Endpoint Protection      Endpoints



                                              Firewall & VPN




Wireless                                      IT Network Services



Network Devices      Smart Phones & Tablets
Mobile / BYOD / MDM
What does the market want today ?

• Lot‘s of players in MDM market – See Gartner
• Customers want to the cost savings
• Users want the flexibility
• Customers requirements today are predominantly straight
 forward :
   –   Protect the network in an ‗open‘ environment
   –   Posture checking
   –   Password requirements
   –   Malware concerns
   –   Remote wipe / control
Gartner Recommendations

―Enterprises must be prepared to manage and secure a
 wide range of devices, some of which they don't own.
 Multiplatform MDM tools are one way to achieve this.‖
                Gartner, ―Top 10 Mobile Technologies for 2012 and 2013‖, 14
                February 2012, Nick Jones


 ―No matter what [BYOD] strategy is selected, the ability to
 detect when unmanaged devices are in use for business
 purposes will be required — and that requires NAC.‖
                Gartner, ―NAC Strategies for Supporting BYOD Environments‖,
                22 December 2011, Lawrence Orans and John Pescatore
ForeScout Solution Options

                                ForeScout          ForeScout                       ForeScout
                               CounterACT         CounterACT                      CounterACT
                                                       +                               +
                                                ForeScout Mobile                ForeScout Mobile
                                                                                       +
                                                                                 MDM (3rd party)                MDM (3rd party)
Operational Management
• Provisioning
• Cost management
• Inventory
Network Security
• Access control
• Block threats
• Stability
Device Security
• Password
• Remote wipe
• Configuration enforcement
• Detect rooted / jailbroken
• Containerization
Unified security management
User impact                    Transparent            Lightweight                        Varies                        Varies
Price                              $                        $$                            $$$*                         $$$$

                                       *Assumes that a portion of the mobile devices are enrolled in a 3rd party MDM
                                       system and the rest are managed by ForeScout Mobile Security Module.
ForeScout MDM

Agility of the cloud for the pace of change in mobility

• Fast deployment
    – Simple provisioning processes
    – Intuitive user interface
• Effortless scalability
    – Instantly turn up devices, users, apps
    – Start small and easily expand up
• Automatic upgrades
    – Continuous updates available instantly
    – No ongoing maintenance
• Unmatched affordability
    – Zero infrastructure needed
    – All inclusive subscription price model
Unified Visibility
Why ForeScout
We Win Awards !
Secure Computing November 2012
The Holy Grail




Slide 27
Why Customers Choose ForeScout

• Easy to deploy
   – Clientless
   – No infrastructure changes
   – Everything in a single appliance
• Rapid time to value
   – Complete visibility in hours or days
• 100% coverage (no blind spots)
   – Users, devices, systems, VMs, apps
• Extensive range of automated controls
   – Transparent, gentle, or aggressive
• Works with every network without costly upgrades
Contacts

Primary Contacts
• John Hagerty – EMEA Sales Director
  jhagerty@forescout.com +44 7739 732805
• Richard Cassidy – Senior EMEA SE
  rcassidy@forescout.com +44 7834 336426
• Nikki Gagie – EMEA Inside Sales and Marketing
  ngagie@forescout.com +44 1256 843633
Thank You

More Related Content

What's hot

Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
Incheon Park
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 

What's hot (20)

The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Nac market
Nac marketNac market
Nac market
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
What is NAC
What is NACWhat is NAC
What is NAC
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 

Viewers also liked

Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
Conor Ryan
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
TheAnfieldGroup
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation
MedCouncilCan
 

Viewers also liked (11)

ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NAC
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
 
2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation 2014 NAC candidate orientation presentation
2014 NAC candidate orientation presentation
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 

Similar to DSS ITSEC Conference 2012 - Forescout NAC #1

Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
 

Similar to DSS ITSEC Conference 2012 - Forescout NAC #1 (20)

Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETSDISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
DISCUSSION ON SECURITY MEASURES FOR PIPELINE CYBER ASSETS
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 

More from Andris Soroka

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

DSS ITSEC Conference 2012 - Forescout NAC #1

  • 1. Automated Security Control John Hagerty – EMEA Sales Director
  • 2. ForeScout Overview ForeScout is a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations. • Founded in 2000 • HQ Cupertino California, R&D Tel Aviv Israel • 44% year-over-year growth – Leading independent vendor of Network Access Control – #2 market share behind Cisco • Global deployments – Multiple vertical industries – Very large deployments (>200,000 endpoints) • Global Support – ‗Follow the sun‘
  • 3. Gartner Leader - December 2011 • A consistent record of growing faster than the ―Magic Quadrant for Network Access Control‖, December 8, 2011; Lawrence Orans and NAC market, and proven ability to win large deals John Pescatore; Gartner, Inc. • The highest visibility among pure-play NAC vendors, particularly in the government and financial sectors • Strong marks for scalability, with some of the largest active deployments of all vendors • Clientless approach that eases the support for a wide variety of endpoints, particularly in BYOD environments • Users continue to cite ease of deployment and flexible enforcement methods as a primary selection criteria
  • 4. Customers and Their Requirements
  • 5. The Challenge: Balance Access Agility With Security • Employees, Guests, • Data loss Contractors Security • Zero-day attacks • Smartphones and and malware personal devices • Endpoint integrity • Wireless, wired, • Regulations and VPN Access compliance Agility Requires real-time, Requires real-time, comprehensive automated controls visibility
  • 6. Large Customers in Each Product Segment • Total purchases: $4.6M - Endpoint Compliance Customer • Primary use: Manage endpoint compliance • Secondary use: Block unauthorized users • Total purchases: $9.8M - Network Access Control (NAC) Customer • Primary use: Block unauthorized users (per DISA requirement) • Secondary use: Enforce policies (no USB memory sticks, etc.) • Total purchases: $2.4M - Endpoint Compliance Mobile Security Customer • Primary use: Visibility, compliance reporting and automated endpoint remediation • Secondary use: Mobile security, enabling‖ Bring Your Own Computer to Work‖ • Total purchases: $3.8M - Threat Protection, Endpoint Compliance, and NAC Customer • Primary use: Segment network (federated organization) • Secondary use: Block attacks, remediate endpoints, register guests • Total purchases: $1.2M - Mobile Security Customer • Primary use: Protecting and managing mobile consumer device
  • 8. Limited Visibility Means Security Gaps Corporate Resources Non-Corporate Endpoints Network Devices Antivirus out of date Applications Firewall installed but turned off Encryption agent not installed Users ForeScout Comprehensive Visibility Protection Possible Visible No Protection Possible Not Visible
  • 9. ForeScout Provides Visibility and Control Network Endpoint Mobile Access Control Compliance Threat Control • Register guests • Find and fix Control • Limit access security gaps • Detect and report • Block unauthorized • Enforce policies • Block intrusions on mobile devices users and rogue • Track violations and worms • Restrict access devices • Detect infected machines Agentless Scalable ForeScout Automated Security Control Platform Knowledgebase . Interoperable
  • 10. How It Works • Out of band Deploy at the Core ForeScout • Clientless CounterACT • One appliance
  • 11. See Grant Fix Protect ForeScout • What type of device? CounterACT • Who owns it? • Who is logged in? • What applications? (((((((
  • 12. See Grant Fix Protect ForeScout • Grant access CounterACT • Register guests • Block access • Restrict access (((((((
  • 13. See Grant Fix Protect Web Email CRM Sales Employee Guest
  • 14. See Grant Fix Protect ForeScout • Remediate OS CounterACT • Fix security agents • Fix configuration • Start/stop applications • Disable peripheral
  • 15. Blocked Admission and Advised What is Out of Compliance
  • 16. See Grant Fix Protect ForeScout • Detect unexpected behavior CounterACT • Block insider attack • Block worms • Block intrusions
  • 17. See Grant Fix Protect ALERT & REMEDIATE RESTRICT ACCESS MOVE & DISABLE Open trouble ticket Deploy a Virtual Firewall around an infected Reassign device from production VLAN to or non-compliant device quarantine VLAN Send email notification Block access with 802.1X SNMP Traps Reassign the device into a VLAN with Alter login credentials to block access restricted access Syslog Block access with device authentication HTTP browser hijack Update access lists (ACLs) on switches, Turn off switch port (802.1X or SNMP) Auditable end-user acknowledgement firewalls and routers to restrict access Terminate unauthorized applications Self-remediation Automatically move device to a pre- Integrate with SMS, WSUS, SCCM, configured guest network Disable peripheral device Lumension, BigFix
  • 18. ForeScout & the IT-GRC Framework Switches & Routers Endpoint Protection Endpoints Firewall & VPN Wireless IT Network Services Network Devices Smart Phones & Tablets
  • 19. Mobile / BYOD / MDM
  • 20. What does the market want today ? • Lot‘s of players in MDM market – See Gartner • Customers want to the cost savings • Users want the flexibility • Customers requirements today are predominantly straight forward : – Protect the network in an ‗open‘ environment – Posture checking – Password requirements – Malware concerns – Remote wipe / control
  • 21. Gartner Recommendations ―Enterprises must be prepared to manage and secure a wide range of devices, some of which they don't own. Multiplatform MDM tools are one way to achieve this.‖ Gartner, ―Top 10 Mobile Technologies for 2012 and 2013‖, 14 February 2012, Nick Jones ―No matter what [BYOD] strategy is selected, the ability to detect when unmanaged devices are in use for business purposes will be required — and that requires NAC.‖ Gartner, ―NAC Strategies for Supporting BYOD Environments‖, 22 December 2011, Lawrence Orans and John Pescatore
  • 22. ForeScout Solution Options ForeScout ForeScout ForeScout CounterACT CounterACT CounterACT + + ForeScout Mobile ForeScout Mobile + MDM (3rd party) MDM (3rd party) Operational Management • Provisioning • Cost management • Inventory Network Security • Access control • Block threats • Stability Device Security • Password • Remote wipe • Configuration enforcement • Detect rooted / jailbroken • Containerization Unified security management User impact Transparent Lightweight Varies Varies Price $ $$ $$$* $$$$ *Assumes that a portion of the mobile devices are enrolled in a 3rd party MDM system and the rest are managed by ForeScout Mobile Security Module.
  • 23. ForeScout MDM Agility of the cloud for the pace of change in mobility • Fast deployment – Simple provisioning processes – Intuitive user interface • Effortless scalability – Instantly turn up devices, users, apps – Start small and easily expand up • Automatic upgrades – Continuous updates available instantly – No ongoing maintenance • Unmatched affordability – Zero infrastructure needed – All inclusive subscription price model
  • 26. We Win Awards ! Secure Computing November 2012
  • 28. Why Customers Choose ForeScout • Easy to deploy – Clientless – No infrastructure changes – Everything in a single appliance • Rapid time to value – Complete visibility in hours or days • 100% coverage (no blind spots) – Users, devices, systems, VMs, apps • Extensive range of automated controls – Transparent, gentle, or aggressive • Works with every network without costly upgrades
  • 29. Contacts Primary Contacts • John Hagerty – EMEA Sales Director jhagerty@forescout.com +44 7739 732805 • Richard Cassidy – Senior EMEA SE rcassidy@forescout.com +44 7834 336426 • Nikki Gagie – EMEA Inside Sales and Marketing ngagie@forescout.com +44 1256 843633