Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

4/27/2012
02:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Gigamon Partners With ForeScout

Companies to provide an integrated set of network management and visibility solutions

SILICON VALLEY, Calif., April 24, 2012 /PRNewswire/ -- Gigamon®, a world leader in Traffic Visibility Fabric™ solutions, today announced that it has partnered with ForeScout Technologies, a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations, to provide an integrated set of network management and visibility solutions that enable real-time network visibility and automated security controls, while minimizing core network switch infrastructure load for network operators and IT leaders.

The partnership enables the ForeScout's automated security control platform (CounterACT) to leverage Gigamon's Traffic Visibility Fabric to have broader visibility of all devices communicating on the network and dynamically apply security policy to reduce a range of security risks. At the heart of the combined solution is the Gigamon Visibility Fabric that provides intelligent traffic mirroring to enable CounterACT to ensure that:

access to network resources and sensitive data is trusted and appropriate; endpoints are accounted for and meet security standards; and violations and threats can be managed faster and with reduced IT intervention.

"Our customers are actively looking for ways to expand visibility in today's infrastructure in parallel with maintaining a framework for security visibility that enables more automated means to take action that preserves operations and safeguards sensitive data," said Michael Stanley, Senior Account Manager at Trace3. "Gigamon and ForeScout bring powerful platforms to bear with regards to advancing situational awareness and network security."

The partnership was formed under Gigamon's Visibility Fabric Ecosystem Partners, which represents an ecosystem of partner companies and organizations committed to making network traffic more visible and the analytics, management and monitoring of the network more intelligent, efficient and versatile for IT and business leaders. In addition, Gigamon has become a member of the ForeScout Strategic Technical Alliance Partner program, a select group of technology companies that have partnered with ForeScout to bring richer solutions to market and better meet customer requirements.

"Partnering with ForeScout Technologies and other program member companies allows us to provide our customers with world-class solutions," said Tara Reeve, Director of Strategic Alliances at Gigamon. "By combining Gigamon's intelligent Traffic Visibility Fabric that enables the forwarding and manipulation of network traffic with ForeScout CounterACT, we are able to provide IT teams the ability to increase connectivity and maintain seamless network visibility, while sustaining a high level of security."

By leveraging Gigamon's Traffic Visibility Fabric, users are able to pass data streams of network traffic to ForeScout's CounterACT solution for device discovery and analysis, network admission, mobile security, endpoint compliance and threat detection. This provides IT real-time inventory and security posture intelligence for active remediation while allowing users to seamlessly connect to the network without disruptions or changes in end-user experience unless necessary. In addition, the GigaVUE® TAP functionality reduces switch SPAN port and port density constraints to allow enhanced network visibility. This functionality also allows "pruning" of traffic data sent to CounterACT to reduce the processing load of the CounterACT Packet Engine.

"Enterprises must support a wide variety of users, devices and access points while at the same time ensuring the protection of information assets and data," said Sam Davis, vice president of business development at ForeScout. "By partnering with Gigamon and leveraging their Traffic Visibility Fabric technology, we can deliver high level of security intelligence and control across wired, wireless, managed and unmanaged network devices."

For more information, please visit the website at http://www.gigamon.com/technology-partners, or call (408) 263-2022. A solution note is available at: http://www.gigamon.com/forescout.

To attend a webcast on May 16, 2012 to learn more about the joint solution, please visit the website HERE.

About ForeScout Technologies, Inc. ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout's automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world's most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

About Gigamon Gigamon® provides intelligent Traffic Visibility Networking solutions for enterprises, data centers and service providers around the globe. Our technology empowers infrastructure architects, managers and operators with unmatched visibility into the traffic traversing both physical and virtual networks without affecting the performance or stability of the production environment. Through patented technologies, the Gigamon GigaVUE® portfolio of high availability and high density products intelligently delivers the appropriate network traffic to security, monitoring or management systems. With over seven years' experience designing and building intelligent traffic visibility products in the US, Gigamon serves the vertical market leaders of the Fortune 1000 and has an install base spanning 40 countries. For more information visit www.gigamon.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).