Sie sind auf Seite 1von 6

ForeScout

Transforming Security
Through Visibility™
SEE
Challenge:
Explosive growth in platforms and IoT devices
30 Billion
Twenty-five years. That’s how long it took to create 5 billion
network-connected devices running a few operating systems
(OSs). By 2020, this number will increase to more
than 30 billion devices running hundreds of OSs—
IoT
the vast majority of which won't be manageable using
agent-based security
methods. Without 5 Billion
a radically new
BYOD
approach, network 0
PC
blind spots will be the
norm and your attack 1990 2015 2020

surface will continue ABI Research, 2017


to expand. Hyper-growth of the Internet of Things (IoT), new OSs and mobility are creating an explosion of unmanaged devices.

Solution: How ForeScout


Agentless visibility and control helps you see more
ForeScout has pioneered an agentless approach to security 1. Poll switches, VPN concentrators,
that provides real-time discovery, classification, assessment access points and controllers for a
list of connected devices
and monitoring of devices, allowing you to see what’s on your
2. Receive SNMP traps from
network, from campus to cloud, and securely manage it.
switches and controllers
3. Monitor 802.1X requests to built-in
How We Do It: or external RADIUS server
Today’s businesses don’t run on standard, cookie-cutter networks. They are 4. Monitor DHCP requests to detect
dynamic and ever-changing. At ForeScout, we offer heterogeneous security when a new host requests an IP
that provides visibility across your network—ranging from devices within address
your campus to workloads in your datacenter and private/public cloud 5. Optionally monitor a network
environments. Our highly flexible, vendor-agnostic approach supports Switch Port Analyzer port to see
Cisco, Aruba, Juniper Networks and others on wired and wireless networks network traffic such as HTTP
traffic and banners
running 802.1X, non-802.1X or both.
6. Run Network Mapper (Nmap) scan
Security begins with knowing what’s on your network. We discover your 7. Use credentials to run a scan on
infrastructure, physical/virtual systems, managed/unmanaged endpoints, IoT the device
and rogue devices—without requiring software agents or previous device 8. Receive NetFlow data
knowledge. Next, our solution assesses device hygiene and continuously
9. Import external Media Access
monitors security posture. Control address classification data
or request LDAP data
Our adaptive data collection capabilities support your choice of data sets
10. Monitor virtual machines in public/
and use advanced active and passive techniques listed to the right to gain
private cloud
in-depth visibility. Our solution quickly evaluates devices and applications,
11. Classify devices using Power over
determining the device user, owner, operating system, configuration, software,
Ethernet with SNMP
services, patch state and presence of security agents. This knowledge lets
you drive accurate access control, enforcement and remediation policies. 12. Use optional agent
Solve your toughest use cases

Internet of Things: Network Access Control: Guest Networking:


Discover IoT devices the instant they Gain real-time visibility of devices, Automate visitor, contractor and
connect to your network—without users, applications and operating partner enrollment and enforce
agents. Classify and profile devices, systems as they access your policy compliance using the
users, applications and operating network. Notify users and IT staff appropriate onboarding options.
systems, and automatically assign of issues and automatically apply Share device security posture
devices to secure Virtual Local Area appropriate access controls such as details and orchestrate enforcement
Network (VLAN) segments and restricting, blocking, quarantining actions with Enterprise Mobility
monitor behavior. or reassigning devices to VLAN Management and Endpoint
segments. Protection tools.

BYOD Endpoint and Regulatory Secure Cloud


Security: Compliance: Computing:
Provide agentless visibility of Monitor devices as they come and Extend visibility and control of
employee-owned notebooks, tablets go from the network and notify devices and virtual machines from
and smartphones as they connect users of policy violations such your campus to your private and
to your network. Enforce access as out-of-date or sub-standard public cloud environments. Gain a
control and endpoint compliance security software, operating single-pane-of-glass view across
policies while eliminating manual systems and configuration settings. physical and virtual environments
labor associated with opening or Automatically redirect users to self- while leveraging existing security
closing network ports. remediation portals. operations' team skills and
processes.

CONTROL “By 2020, at least 25% of
organizations will be utilizing
a real-time discovery, visibility
and control mechanism for
securing IoT, up from 5%
Challenge: today.”
Too many security alerts, not enough enforcement —Gartner, Real-Time Discovery,
Visibility and Control Are Critical
Most security tools are great at sending alerts, yet incapable
for IoT Security, Saniye Burcu
of enforcing actions. As a result, security teams are Alaybeyi and Lawrence Orans,
overwhelmed with the volume of alerts that must be manually 03 November 2016
evaluated and resolved. Some alerts generate false positives
and get ignored—others slip by due to resource constraints.

Solution:
Policy-based segmentation and enforcement
ForeScout automates policy-based access control and enforcement of devices, users and
applications, allowing you to limit access to appropriate resources, automate guest onboarding,
find and fix endpoint security gaps and help maintain and improve compliance with industry
regulations.

How We Do It:
ForeScout lets you automate a vast range of active or passive actions and enforce controls upon connection—
depending upon your policies and the severity of the situation. To achieve this, we use a policy engine that
continuously checks devices against a set of policies that dictates and enforces device behavior on the network.
Unlike other vendors’ products that periodically check or query devices, our policy engine can monitor behavior in
real time for over one million devices in a single deployment.

Policies are triggered based on events occurring on a specific device. These can be network admission events
(plugging into a switch port or an IP address change), authentication events (received by RADIUS servers
or detected by network traffic), user/device behavior changes (disabling antivirus software, adding banned
peripherals, opening/closing ports) and specific traffic behavior such as how the device is communicating and what
protocol it uses.

Notify Conform Restrict


• Email users/administrators • Move to guest network • Quarantine device
• Send on-screen notification • Change wireless user role • Turn off switch port
• Redirect to web page • Assign to self-remediation VLAN • Block wireless or VPN access
• Request end-user response • Restrict rogue devices • Use ACLs to restrict access
• Send Syslog/CEF messages • Start applications/process • Terminate unauthorized apps
• Open help desk ticket • Update antivirus/security agents • Disable NIC/peripherals
• Share context with IT systems • Apply OS updates/patches • Trigger remediation systems

ForeScout can enforce the appropriate level of control—from modest to stringent—based on your security policies.
ORCHESTRATE
Challenge:
“When it’s late at night,
Fragmented security or when my staff is
Large enterprises have dozens of disconnected, disjointed sleeping, ForeScout
security systems. This siloed approach prevents a coordinated, is working with our
enterprise-wide security response, allowing attackers more
time to exploit system vulnerabilities.

Solution:
other security
solutions to take
immediate action on

threats. You can’t put a
Security automation price tag on that type
ForeScout orchestrates information sharing and policy-based of automation.”
security enforcement operations with leading IT and security — Michael Roling, Chief
Information Security Officer,
management products to automate security workflows and
State of Missouri
accelerate threat response without human intervention.

How We Do It:
With visibility and control as foundational capabilities, ForeScout can break down security silos and leverage your
existing security investments. ForeScout Modules enable a constant exchange of device hygiene, threat, behavior
and compliance data to make your existing security tools and analysis smarter and more context-aware. Your
security infrastructure gains critical control functionality, allowing you to automate manual policy enforcement,
accelerate response and substantially improve your security posture. Here are a few examples of how ForeScout
lets you layer your tools on top of ours to achieve system-wide security orchestration:

Advanced Threat Detection (ATD): Security Information and Event Dynamic Network Segmentation:
Upon detecting malware and Management (SIEM): The ForeScout Deep integration with leading
indicators of compromise (IOCs), platform detects and profiles devices firewall, switch and router vendors’
leading ATD products instantly as they connect to the network products lets our policy engine
notify the ForeScout platform. Then, and shares device details with the automatically apply VLANs or
based on policy, ForeScout’s solution SIEM, making it more intelligent. Access Control Lists (ACLs) to
isolates infected devices and takes The SIEM responds with a device place or reassign devices and users
remediation actions. It also scans assessment based on events and on appropriate network segments.
existing and new devices for IOCs logs collected. ForeScout turns this Segmenting guests, contractors,
and initiates mitigation. insight into action, allowing, denying specific employees and IoT devices
or quarantining devices according to helps protect against pivot, lateral,
your security policies. insider and DDoS attacks.

For a full list of orchestration capabilities, visit forescout.com/modules. Here are some of the partners we work with:
“ Company Snapshot
Industry: Cyber/IoT Security

“What ForeScout Customers: Global 2000 enterprises and government agencies in over 60
countries*
achieved in Network
Access Control (NAC) Markets: Financial services, government and defense, healthcare,
manufacturing, education, retail and critical infrastructure
technology is clearly
transformational.” Founded: 2000

— Frost & Sullivan Best of CEO: Michael DeCesare


Network Security 2016

2016 Awards and Recognitions:


“ForeScout provides • JPMorgan Chase Hall of • Nanalyze – 9 Hot Cybersecurity
JPMorgan Chase with Fame Innovation Award Startups
enhanced visibility for Transformative Security • CRN (Computer Reseller News)
Technology Top Security Company
and control across the
• Gartner IoT Security Market Guide
hundreds of thousands • Inc. 5000 Fastest Growing
of devices connected • Gartner NAC Market Guide Companies

to our corporate • Forbes Top 100 Cloud Companies • SC Magazine Europe Best NAC
Solution
network.” • Deloitte's Technology Fast 500™
— Rohan Amin, Global CISO,
JPMorgan Chase & Co.
Security Frameworks/Compliance Mandates:
The leading security standards bodies and frameworks share one
foundational principle: Security begins with visibility. ForeScout supports
enterprise and government organizations' compliance efforts with these
mandates:
• Center for Internet Security CSCs • ISO/IEC 27001 (International
(Critical Security Controls) Standards Organization/
International Electrotechnical
• CDM (Continuous Diagnostics and
Commission)
Mitigation)
• NIST (National Institute of
• FISMA (Federal Information
Standards and Technology) Risk
Security Management Act)
Management Framework
• HIPAA (Health Insurance
• PCI-DSS (Payment Card Industry
Portability and Accountability Act)
Data Security Standard)
• HITECH (Health Information
• SCAP (Security Content
Technology for Economic and
Automation Protocol)
Clinical Health Act)
• SOX (Sarbanes-Oxley Act)

Worldwide offices:
San Jose, CA (Headquarters)
Dallas
London *As of December 31, 2016
New York
Sydney © 2017. ForeScout Technologies, Inc. is a privately held Delaware corporation. ForeScout, the ForeScout logo,
ActiveResponse, ControlFabric, CounterACT, CounterACT Edge and SecureConnector are trademarks or registered
Tel Aviv
trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners. For acronym
Washington, D.C. definitions, visit www.forescout.com. Version 5_17

Das könnte Ihnen auch gefallen