Forescout Delivers Impact-Based Security Risk Assessment Tool for Industrial Control System and Operational Technology Networks
SilentDefense mitigates risks against increased ICS security threats with new performance analytics and compliance standards for large enterprises
October 15, 2019
PRESS RELEASE
SAN JOSE, Calif. – Oct. 07, 2019 – Forescout Technologies, Inc. (NASDAQ: FSCT), the leader in device visibility and control, today announced it added new innovation to its industrial control system security solution SilentDefense to help organizations aggregate and prioritize risks targeting OT and IoT devices. The new Asset Risk Framework provides users with intuitive, impact-based scores in a central dashboard so they can determine their current security risk exposure, identify assets that have a high potential of being attacked and enable engineers to take action on the assets that need attention.
Network security monitoring tools create large amounts of information which can be very challenging for cybersecurity and operational stakeholders to review. By aggregating and prioritizing operational and cyber security-based risk, real time decisions can be made quickly saving money and reducing probable issues to the networks.
“The convergence of IT and OT networks and threats posed by the adoption of IIoT devices and services in the cloud has left enterprises more vulnerable than ever before,” said Damiano Bolzoni, vice president of OT and industrial business, Forescout. “It is essential that organizations have access to real time data and visibility of its entire network so they can quickly understand their risk exposure and take preventative measures to mediate against the threats.”
This automated and intuitive approach to network security and operational monitoring will enable customers to deploy an advanced and holistic OT/ICS cybersecurity solution that meets the increased threat landscape that they face today.
Forescout’s SilentDefense now also offers newly expanded capabilities and innovations providing a predictable and preventative form of risk analysis to lessen the exposure faced:
· Active PLC Queries: Seamless process for cyber security analysts to create alert parameters so they can quickly set up custom compliance and monitoring directives so that no PLC/Controller can go unseen.
· Enhanced Compliance Reporting: Critical infrastructure managed by utility and energy organizations have compliance obligations when securing its networks. Forescout has now automated the compliance and reporting process for North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) compliance.
· FIPS Compliant: All government and federal organizations have to ensure they are Federal Information Processing Standards (FIPS) compliant. SilentDefense now includes tools and functions to allow these organizations to easily adhere to the security requirements of OT and ICS Networks of FIPS for implementing crypto algorithms, encryption schemes, handling important data, and working with various operating systems and hardware.
About Forescout
Forescout Technologies, Inc. provides security at first sight. Our company delivers device visibility and control to enable enterprises and government agencies to gain complete situational awareness of their environment and orchestrate action. Learn more at www.forescout.com.
© 2019 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware corporation. A list of our trademarks and patents can be found at https://www.forescout.com/company/legal/intellectual-property-patents-trademarks. Other brands, products, or service names may be trademarks or service marks of their respective owners.
Media Relations Contact:
Katie Beck
Forescout Technologies, Inc.
650-314-8705
[email protected]
Investor Relations Contact:
Michelle Spolver
Forescout Technologies, Inc.
408-721-5884
[email protected]
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024