ForeScout Expands IDM Offerings
ForeScout's CounterACT is now integrated to the industry leading Oracle Access Manager and Oracle Identity Manager products
CUPERTINO, Calif. -- ForeScout Technologies, a provider of clientless network access control (NAC) for Fortune 500 enterprises and government organizations, announced today that ForeScout's CounterACT is now integrated to the industry leading Oracle(R) Access Manager and Oracle Identity Manager products. This allows CounterACT to not only help ensure and enforce compliance of network security policies but expands enforcement options by pairing connecting devices with their identity profile in Oracle Identity Manager. The combination of role-based information and network infrastructure provides enterprises with the ability to enforce user-specific policy at the network device level accomplishing unprecedented level of network security policy enforcement. ForeScout is a member of the Oracle PartnerNetwork.
Oracle Identity Management serves as the security backbone for Oracle Fusion Middleware and enables organizations to decrease security threats across diverse IT environments while helping address compliance needs. The family of products includes Oracle Access Manager, Oracle Identity Manager, Oracle Identity Federation, Oracle Virtual Directory, Oracle Directory Services, Oracle Enterprise Single Sign-On Suite and Oracle Web Services Manager.
"Customers need to know not only who is connecting to their infrastructure but the device they are bringing onto the network and its condition and compliance to company network policies," stated Ayelet Steinitz, vice president, business development for ForeScout Technologies.
"It was this customer demand that fueled the integration efforts between ForeScout's NAC solutions and Oracle Identity Management products. This integration enables customers to help ensure devices connecting to their infrastructure are compliant with network security policies and enforce those policies as well as the identity and rights of the person using the device. This creates a more controlled and secure environment where users and their devices are accessing only appropriate, approved resources."
About the Author
You May Also Like
Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024