Endpoint
8/21/2012
09:06 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

ForeScout Adds Mobile Security To NAC As A Service For MSPs

MSP package teams ForeScout Mobile add-on modules with NAC solution, CounterACT

Cupertino, Calif — August 21, 2012 — ForeScout Technologies, Inc., a leading provider of automated security control solutions for Global 1000 enterprises and government organizations, today announced that ForeScout has added mobile security to its NAC-as-a-Service platform packaged for managed service providers (MSPs). The MSP package teams ForeScout Mobile add-on modules with its award winning network access control (NAC) solution, CounterACT, to offer MSPs a flexible, yet integrated approach for “bring your own device” (BYOD) services.

“As companies face an invasion of employee-owned mobile devices, the ability to view who, and with what type of device, is connecting to enterprise data becomes increasingly important,” said Chris Hazelton, research director of Mobile and Wireless at 451 Research. “CounterACT as a service targets the hosting market and managed service providers. We like the single-console approach, letting IT choose how best to combine NAC and MDM. For IT, which is still under pressure to keep costs down, the ability to slot in modules to manage mobile devices goes a way toward limiting additional training that staff will need. As IT needs to react to the mobile invasion, we see strong synergies between NAC and MDM to control the movement of corporate data across smartphones and tablets.” 1

ForeScout CounterACT NAC offers a proven approach to enable any IT organization to gain real-time visibility and automated control over who, how, when and what devices are connecting to the enterprise. All devices are identified and controlled whether wired, wireless, PC, mobile, corporate provisioned or personal. ForeScout Mobile is a set of add-on modules to CounterACT that enables security teams to gain granular intelligence, security assessment and enforcement options for mobile devices to accelerate bring your own device adoption and better manage mobile security risks. The ForeScout CounterACT, ForeScout Mobile pairing is now available as a subscribed hosted or managed service through authorized MSPs.

"IT departments don’t have a complete view of exactly what’s on their network at any given time, which affects operations and compliance. Enabling bring your own device initiatives, while increasing end-user connectivity and productivity, introduces access and data leakage risks,” said Gord Boyce, CEO of ForeScout. “ForeScout delivers MSPs a smart, flexible and integrated approach to address demand for BYOD and mobile security, while at the same time offers a compelling suite of access and endpoint compliance services.”

ForeScout Mobile Security Module provides extensive information about the device, its user, its configuration, its apps and its security posture for iOS and Android platforms. Combining network with device-level security via a ForeScout Mobile app, the solution offers an extensive array of policy-based controls. ForeScout Mobile Integration Module allows organizations to leverage their existing MDM solution within the broader context of unified security access and endpoint compliance that CounterACT provides. With this module, security teams can consolidate information about all endpoints on the network, including unmanaged mobile devices and those managed by their MDM system, into the CounterACT platform, as well as complement network-based controls with MDM device-level security.

With ForeScout, MSPs benefit from:

Ø Broad service capabilities, non-disruptive implementation, management ease and faster time-to-value – which is equally compelling for their clients

Ø Greater purchase flexibility, with monthly pricing, tiered discounts and on-demand license expansion options

Ø Additional marketing and implementation materials to streamline prospecting and service development

Ø A more agile and integrated solution that does not require agents or 802.1x managed endpoints and offers full interoperability to work in even the most demanding environments – no need to alter or upgrade the customer’s network or security infrastructure

Ø Service-ready, with a built-in and customizable array of device identification and auto-classification capabilities as well as extensible network access, endpoint compliance, guest networking and threat prevention security templates.

ForeScout invites its channel partners and prospective service providers to explore CounterACT MSP package at www.forescout.com/msp. ForeScout is demonstrating the combined solution at the XChange 2012 / Latin America conferences being held in Dallas, Texas this week.

About ForeScout Technologies, Inc. ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout’s automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web