SlideShare a Scribd company logo
1 of 27
CounterACT Security Platform Knowledge. Access Control. Compliance
Securing Your Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Knowledge Slide  © 2009 ForeScout Technologies
Securing Your Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Access Control Slide  © 2009 ForeScout Technologies
Securing Your Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  Compliance  © 2009 ForeScout Technologies
CounterACT Security Platform ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  The Right Tool To Secure Your Business © 2009 ForeScout Technologies
CounterACT: Knowledge Know Who and What Is On Your Network
CounterACT: Knowledge ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  Real-Time Information About Your Network © 2009 ForeScout Technologies
CounterACT: Knowledge ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  Real-Time Information About Your Network © 2009 ForeScout Technologies
CounterACT: Network Access Control Enforce Policies Without Disrupting Business
CounterACT: Access Control Basics of a Complete Solution Slide  © 2009 ForeScout Technologies
CounterACT: Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  A Complete Access Control Solution © 2009 ForeScout Technologies
CounterACT: Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  Flexible Policy Creation © 2009 ForeScout Technologies
CounterACT: Access Control Full Spectrum of Enforcement/Remediation Actions Slide  © 2009 ForeScout Technologies
CounterACT: Access Control Full Spectrum of Enforcement Actions Automatically move device to a pre configured guest network SMS, Lumension Integrations  Self-Remediation  Auditable End-user Acknowledgement Syslog SNMP Traps Block access with device authentication Alter login credentials to restrict or block access Block access with 802.1X Reassign device from production VLAN to quarantine VLAN Update access lists on switches, firewalls and routers to restrict access ** Customer-preferred enforcement options Slide  © 2009 ForeScout Technologies MOVE AND DISABLE HTTP Browser Hijack/Redirect ** Open Trouble Ticket ** Turn off physical switch port ** Reassign the device into a VLAN with restricted access to resources and services ** Deploy a Virtual Firewall around an infected or non-compliant device ** Terminate unauthorized applications ** RESTRICTIVE ACCESS ALERT AND INFORM Send Email **
CounterACT: Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Report on Security Events and Remediation Slide  © 2009 ForeScout Technologies
CounterACT: Compliance Implement Controls to  Stop Unauthorized Access
CounterACT: Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Visibility and Access Control Foundation For Compliance Slide  © 2009 ForeScout Technologies
CounterACT: Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Access Control at the Heart of Compliance Initiatives Slide  © 2009 ForeScout Technologies
CounterACT: Compliance Example: PCI Data Security Standard Coverage Pre-Packaged Policies Covering 8 of 12 PCI Requirements Slide  © 2009 ForeScout Technologies
CounterACT: Compliance ,[object Object],[object Object],Example: PCI Data Security Standard Reporting Slide  © 2009 ForeScout Technologies
CounterACT: Simple Deployment Non-Disruptive Roll Out of NAC Platform
Deploying CounterACT CounterACT Integration Plug-ins Speed and Ease Deployment Maximizing  Existing Network Investments  Slide  © 2009 ForeScout Technologies Switches/ Routers Remediation Network Services Wireless Access Points Remote Access Non-User Devices Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CounterACT Works With Your Existing Infrastructure  Custom Scripting Any IP Based Device FS Virtual Firewall
CounterACT: Non Disruptive Deployment Steps To Achieving Deployment Without Disruption  Slide  © 2009 ForeScout Technologies
CounterACT: Non-Disruptive Deployment Informed Users Achieve Compliance Before Sanctions are Imposed   Enforcement is Limited to a Small Number of Policy Violators  Deployment Timeline Level of Non- Compliance Users To Compliance Without Effecting Productivity Slide  © 2009 ForeScout Technologies
CounterACT Scalability CounterACT Product Family All Deployment Scenarios Covered  Slide  © 2009 ForeScout Technologies CT- R CT- 100 CT- 1000 CT- 2000 CT- 4000 Concurrent Devices 50 250 1000 2500 4000 Bandwidth 100 Mbps 100 Mbps 1 Gbps 2 Gbps 4 Gbps or 10 Gbps VLAN Support Unlimited Unlimited Unlimited Unlimited Unlimited CT- 4000 CT-R CT-100 CT-1000 CT-2000
CounterACT Security Platform ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Slide  The Right Tool To Secure Your Business © 2009 ForeScout Technologies
CounterACT Architecture

More Related Content

What's hot

Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
Incheon Park
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
Tom Kopko
 

What's hot (20)

Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Nac market
Nac marketNac market
Nac market
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 

Viewers also liked

Network security
Network securityNetwork security
Network security
fangjiafu
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
Conor Ryan
 

Viewers also liked (12)

Network security
Network securityNetwork security
Network security
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
Protocolo Spanning Tree
Protocolo Spanning TreeProtocolo Spanning Tree
Protocolo Spanning Tree
 
CCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol ImplementationCCNA R&S-13-Spanning Tree Protocol Implementation
CCNA R&S-13-Spanning Tree Protocol Implementation
 
NAT with ASA & ASA Security Context
NAT with ASA & ASA Security ContextNAT with ASA & ASA Security Context
NAT with ASA & ASA Security Context
 
OSPF- Multi area
OSPF- Multi area OSPF- Multi area
OSPF- Multi area
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
NAT in ASA Firewall
NAT in ASA FirewallNAT in ASA Firewall
NAT in ASA Firewall
 
Basic ASA Configuration, NAT in ASA Firewall
Basic ASA Configuration,NAT in ASA FirewallBasic ASA Configuration,NAT in ASA Firewall
Basic ASA Configuration, NAT in ASA Firewall
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Digital Business - Accenture
Digital Business - AccentureDigital Business - Accenture
Digital Business - Accenture
 

Similar to NAC Solution Taarak

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 

Similar to NAC Solution Taarak (20)

Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
SECURE Out-of-Band Management
SECURE Out-of-Band ManagementSECURE Out-of-Band Management
SECURE Out-of-Band Management
 
Emobility remote access services clientcurrent[1]
Emobility remote access services clientcurrent[1]Emobility remote access services clientcurrent[1]
Emobility remote access services clientcurrent[1]
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Hosted security
Hosted securityHosted security
Hosted security
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
BYOD without Compromise
BYOD without CompromiseBYOD without Compromise
BYOD without Compromise
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 

NAC Solution Taarak

  • 1. CounterACT Security Platform Knowledge. Access Control. Compliance
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. CounterACT: Knowledge Know Who and What Is On Your Network
  • 7.
  • 8.
  • 9. CounterACT: Network Access Control Enforce Policies Without Disrupting Business
  • 10. CounterACT: Access Control Basics of a Complete Solution Slide © 2009 ForeScout Technologies
  • 11.
  • 12.
  • 13. CounterACT: Access Control Full Spectrum of Enforcement/Remediation Actions Slide © 2009 ForeScout Technologies
  • 14. CounterACT: Access Control Full Spectrum of Enforcement Actions Automatically move device to a pre configured guest network SMS, Lumension Integrations Self-Remediation Auditable End-user Acknowledgement Syslog SNMP Traps Block access with device authentication Alter login credentials to restrict or block access Block access with 802.1X Reassign device from production VLAN to quarantine VLAN Update access lists on switches, firewalls and routers to restrict access ** Customer-preferred enforcement options Slide © 2009 ForeScout Technologies MOVE AND DISABLE HTTP Browser Hijack/Redirect ** Open Trouble Ticket ** Turn off physical switch port ** Reassign the device into a VLAN with restricted access to resources and services ** Deploy a Virtual Firewall around an infected or non-compliant device ** Terminate unauthorized applications ** RESTRICTIVE ACCESS ALERT AND INFORM Send Email **
  • 15.
  • 16. CounterACT: Compliance Implement Controls to Stop Unauthorized Access
  • 17.
  • 18.
  • 19. CounterACT: Compliance Example: PCI Data Security Standard Coverage Pre-Packaged Policies Covering 8 of 12 PCI Requirements Slide © 2009 ForeScout Technologies
  • 20.
  • 21. CounterACT: Simple Deployment Non-Disruptive Roll Out of NAC Platform
  • 22.
  • 23. CounterACT: Non Disruptive Deployment Steps To Achieving Deployment Without Disruption Slide © 2009 ForeScout Technologies
  • 24. CounterACT: Non-Disruptive Deployment Informed Users Achieve Compliance Before Sanctions are Imposed Enforcement is Limited to a Small Number of Policy Violators Deployment Timeline Level of Non- Compliance Users To Compliance Without Effecting Productivity Slide © 2009 ForeScout Technologies
  • 25. CounterACT Scalability CounterACT Product Family All Deployment Scenarios Covered Slide © 2009 ForeScout Technologies CT- R CT- 100 CT- 1000 CT- 2000 CT- 4000 Concurrent Devices 50 250 1000 2500 4000 Bandwidth 100 Mbps 100 Mbps 1 Gbps 2 Gbps 4 Gbps or 10 Gbps VLAN Support Unlimited Unlimited Unlimited Unlimited Unlimited CT- 4000 CT-R CT-100 CT-1000 CT-2000
  • 26.