Ellen Sundra, CISSP
Senior Federal Systems Engineer, ForeScout
ForeScout in Conjunction with 4K Solutions
© 2014 ForeScout Technologies, Page 2
VISIBLE NOT VISIBLE
Corporate Resources
Network
Devices
Endpoints
Applications
Users
Antivirus out of date
Unauthorized application
Agents not installed or
not running
Non-
corporate
© 2014 ForeScout Technologies, Page 3
Control Access
Based on Compliance
Incident Response
Compliance Dashboard
Complete
Visibility
Enforcement Remediation
Information
Sharing
Endpoint
Interrogation &
Authentication
Device Discovery, Profiling
[HW/SW USER LOC ...]
Multi-factor, Complete,
Clientless, Access Control
Continuous
Monitoring
Challenge
• Asset visibility
• Access and threat dynamics
• Endpoint and infrastructure diversity
• Network authentication and control
• Dynamic threats and remediation costs
Solution
• Pre-admission user/device
authentication and authorization
• Continuous endpoint diagnostics,
posture assessment and mitigation
• Port-based control and broad device
policy enforcement
• Infrastructure agnostic, interoperable,
scalable, works with enterprise tool sets Natively or Using Existing
Enterprise Tools
© 2014 ForeScout Technologies, Page 4
Open
Platform
MDM
SIEM
Vulnerability
Assessment
Endpoint
Protection
Endpoints
Network
Infrastructure
Advanced
Threat
Detection
Identity
© 2014 ForeScout Technologies, Page 5
Deployment Timeline
Change Control Boards can study the
water and take a stair-step approach
to implementing change
Enforcement is
Limited to a Small
Number of Policy
ViolatorsLevel of Non-
Compliance
Control Network Access at Anytime
© 2014 ForeScout Technologies, Page 6
Questions
?
Thank you!
© 2014 ForeScout Technologies, Page 6
Questions
?
Thank you!

CDM….Where do you start? (OA Cyber Summit)

  • 1.
    Ellen Sundra, CISSP SeniorFederal Systems Engineer, ForeScout ForeScout in Conjunction with 4K Solutions
  • 2.
    © 2014 ForeScoutTechnologies, Page 2 VISIBLE NOT VISIBLE Corporate Resources Network Devices Endpoints Applications Users Antivirus out of date Unauthorized application Agents not installed or not running Non- corporate
  • 3.
    © 2014 ForeScoutTechnologies, Page 3 Control Access Based on Compliance Incident Response Compliance Dashboard Complete Visibility Enforcement Remediation Information Sharing Endpoint Interrogation & Authentication Device Discovery, Profiling [HW/SW USER LOC ...] Multi-factor, Complete, Clientless, Access Control Continuous Monitoring Challenge • Asset visibility • Access and threat dynamics • Endpoint and infrastructure diversity • Network authentication and control • Dynamic threats and remediation costs Solution • Pre-admission user/device authentication and authorization • Continuous endpoint diagnostics, posture assessment and mitigation • Port-based control and broad device policy enforcement • Infrastructure agnostic, interoperable, scalable, works with enterprise tool sets Natively or Using Existing Enterprise Tools
  • 4.
    © 2014 ForeScoutTechnologies, Page 4 Open Platform MDM SIEM Vulnerability Assessment Endpoint Protection Endpoints Network Infrastructure Advanced Threat Detection Identity
  • 5.
    © 2014 ForeScoutTechnologies, Page 5 Deployment Timeline Change Control Boards can study the water and take a stair-step approach to implementing change Enforcement is Limited to a Small Number of Policy ViolatorsLevel of Non- Compliance Control Network Access at Anytime
  • 6.
    © 2014 ForeScoutTechnologies, Page 6 Questions ? Thank you!
  • 7.
    © 2014 ForeScoutTechnologies, Page 6 Questions ? Thank you!

Editor's Notes

  • #2 Ellen Sundra, CISSP Federal Systems Engineer