Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

11/29/2012
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IBM And ForeScout Team on Network Security Intelligence And Automated Threat Response

Partnership will allow joint customers to improve real-time visibility, security intelligence, and automated control

Cupertino, Calif. — November 20, 2012 — ForeScout Technologies, Inc., a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations, today announced that it has been certified by Q1 Labs, an IBM company and global provider of security intelligence solutions, for its Security Intelligence Partner Program (SIPP). This partnership will allow joint customers to greatly improve real-time visibility, security intelligence and automated control while delivering real-time monitoring and enterprise risk assessment of non-compliant managed and unmanaged network devices.

Increasingly, security threats are originating from unmanaged devices such as smartphones and tablets, a problem solved by integrating ForeScout CounterACT Network Access Control (NAC) with the IBM QRadar Security Intelligence Platform. The joint solution provides customers with a real-time view of enterprise-wide threats that can originate from non-compliant devices and rapid remediation of them to reduce overall business risk. CounterACT identifies all network devices in real-time, assesses whether or not it is compliant, and if necessary blocks the device or redirects it to a secure guest access network, and attempts to remediate the issue - all from a single management console.

Through this integration, QRadar captures, retains and analyzes events generated from ForeScout CounterACT, including network access incidents and policy violations for endpoints and mobile devices. As a member of Q1 Labs’ Security Intelligence Program, ForeScout leverages Q1 Labs’ open protocols, including LEEF (Log Event Enhanced Format) to enhance correlation of security and application layer event data. Furthermore, QRadar can be configured to send action response commands to CounterACT to mitigate QRadar-correlated threats and violations. This level of network access control (NAC), log management and security event management integration enables security professionals to further streamline incident response, forensics and compliance processes.

“Any unmanaged, unknown or insecure devices, including personal mobile devices, on a corporate network present serious security risks and potential operational impact to IT,” said Avi Zelovich, director of product management for ForeScout. “Our alliance with IBM Security helps to alleviate this challenge by giving enterprises visibility into every single device on their network, which greatly improves their overall security posture and GRC compliance.”

“By integrating ForeScout CounterACT with IBM’s QRadar, customers can better see and manage access and endpoint compliance policies and controls for all users and devices, whether using managed or unmanaged BYOD personal mobile devices, as well as take directed action on eminent threats and known violations,” said Matt Ward, senior product manager, IBM.

For more information about the Security Intelligence Partner Program, please visit http://q1labs.com/partners/security-intelligence-partner-program.aspx.

Relevant Links

ForeScout Blog

ForeScout Twitter

Tweet this: ForeScout & IBM Team on Network Security; CounterACT Integrates with Q1 Labs’ QRadar http://hub.am/XNx0fd

ForeScout CounterACT

ForeScout is a fully integrated NAC solution that delivers hybrid 802.1X and agentless NAC functionality making it the easiest and most flexible to deploy, administer and scale. CounterACT lets organizations see and control everything connected to their network, no matter the device or user. The platform employs 802.1X, RADIUS and multi-factor authentication, identity and endpoint assessment technologies to grant, limit or block access, as well as manage guests and mobile devices in real-time. Advanced policy enforcement capabilities allow administrators to set rules that can dynamically find and fix endpoint configuration and security issues with little or no intervention, or to automatically quarantine or remove devices in compliance violation or exhibiting malicious behavior.

About ForeScout Technologies, Inc. ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout’s automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...