Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/21/2012
09:06 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ForeScout Adds Mobile Security To NAC As A Service For MSPs

MSP package teams ForeScout Mobile add-on modules with NAC solution, CounterACT

Cupertino, Calif — August 21, 2012 — ForeScout Technologies, Inc., a leading provider of automated security control solutions for Global 1000 enterprises and government organizations, today announced that ForeScout has added mobile security to its NAC-as-a-Service platform packaged for managed service providers (MSPs). The MSP package teams ForeScout Mobile add-on modules with its award winning network access control (NAC) solution, CounterACT, to offer MSPs a flexible, yet integrated approach for “bring your own device” (BYOD) services.

“As companies face an invasion of employee-owned mobile devices, the ability to view who, and with what type of device, is connecting to enterprise data becomes increasingly important,” said Chris Hazelton, research director of Mobile and Wireless at 451 Research. “CounterACT as a service targets the hosting market and managed service providers. We like the single-console approach, letting IT choose how best to combine NAC and MDM. For IT, which is still under pressure to keep costs down, the ability to slot in modules to manage mobile devices goes a way toward limiting additional training that staff will need. As IT needs to react to the mobile invasion, we see strong synergies between NAC and MDM to control the movement of corporate data across smartphones and tablets.” 1

ForeScout CounterACT NAC offers a proven approach to enable any IT organization to gain real-time visibility and automated control over who, how, when and what devices are connecting to the enterprise. All devices are identified and controlled whether wired, wireless, PC, mobile, corporate provisioned or personal. ForeScout Mobile is a set of add-on modules to CounterACT that enables security teams to gain granular intelligence, security assessment and enforcement options for mobile devices to accelerate bring your own device adoption and better manage mobile security risks. The ForeScout CounterACT, ForeScout Mobile pairing is now available as a subscribed hosted or managed service through authorized MSPs.

"IT departments don’t have a complete view of exactly what’s on their network at any given time, which affects operations and compliance. Enabling bring your own device initiatives, while increasing end-user connectivity and productivity, introduces access and data leakage risks,” said Gord Boyce, CEO of ForeScout. “ForeScout delivers MSPs a smart, flexible and integrated approach to address demand for BYOD and mobile security, while at the same time offers a compelling suite of access and endpoint compliance services.”

ForeScout Mobile Security Module provides extensive information about the device, its user, its configuration, its apps and its security posture for iOS and Android platforms. Combining network with device-level security via a ForeScout Mobile app, the solution offers an extensive array of policy-based controls. ForeScout Mobile Integration Module allows organizations to leverage their existing MDM solution within the broader context of unified security access and endpoint compliance that CounterACT provides. With this module, security teams can consolidate information about all endpoints on the network, including unmanaged mobile devices and those managed by their MDM system, into the CounterACT platform, as well as complement network-based controls with MDM device-level security.

With ForeScout, MSPs benefit from:

Ø Broad service capabilities, non-disruptive implementation, management ease and faster time-to-value – which is equally compelling for their clients

Ø Greater purchase flexibility, with monthly pricing, tiered discounts and on-demand license expansion options

Ø Additional marketing and implementation materials to streamline prospecting and service development

Ø A more agile and integrated solution that does not require agents or 802.1x managed endpoints and offers full interoperability to work in even the most demanding environments – no need to alter or upgrade the customer’s network or security infrastructure

Ø Service-ready, with a built-in and customizable array of device identification and auto-classification capabilities as well as extensible network access, endpoint compliance, guest networking and threat prevention security templates.

ForeScout invites its channel partners and prospective service providers to explore CounterACT MSP package at www.forescout.com/msp. ForeScout is demonstrating the combined solution at the XChange 2012 / Latin America conferences being held in Dallas, Texas this week.

About ForeScout Technologies, Inc. ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout’s automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...