Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/14/2012
11:19 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ForeScout And Fiberlink Team On Fully Integrated NAC And MDM Solution

ForeScout MDM combines cloud-based mobile device management services, comprehensive device support, and unified security control

Cupertino, Calif. — May 8, 2012 — ForeScout Technologies, Inc., a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations, and Fiberlink, the leader in software-as-a-service (SaaS) solutions for secure mobile device management (MDM) and mobile application management (MAM), announced a partnership to deliver the industry’s first fully integrated MDM and network access control (NAC) offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile device management services, comprehensive device support and unified security control. As a result, enterprises have the most flexible, cost-effective approach to simplify bring your own device (BYOD) and mobile security management.

The joint solution has already been successfully deployed at a Fortune 500 financial institution. It provides the security and compliance needed to accelerate managed and personal mobile device adoption while mitigating risks, especially for companies in highly regulated industries.

As recommended by Gartner, NAC provides one of the most flexible approaches to securely support BYOD. Other technologies, such as MDM and HVD, will be used to complement NAC, particularly by enterprises that adopt an embrace strategy. Most organizations should start with a contain strategy and use NAC policies to isolate personally owned mobile devices in a limited access zone, where they may access a subset of applications and data. In enterprises that aspire to an embrace BYOD strategy, network security managers should work jointly with IT counterparts to develop NAC policies that complement mobile device strategies. 1

In the BYOD era, the ability to manage employees and their personal mobile devices connecting to enterprise resources and sensitive data is essential. Only ForeScout CounterACT and MaaS360 provide the level of management, visibility and control needed across all mobile devices, users, networks, applications and data.

“IT organizations want to take advantage of personal mobile device use, but require an approach that is cost-effective, manageable and secure," said Gord Boyce, CEO of ForeScout Technologies. “With the addition of ForeScout MDM to our mobile security product line, we are the first to offer the most flexible and cost-effective means for enterprises to contain or embrace BYOD while assuring appropriate security controls.”

“MaaS360’s cloud-based approach delivers the agility, security and scalability required in the mobile enterprise today,” said Jim Sheward, CEO of Fiberlink. “We are excited to team with ForeScout to bring a combined solution that provides end-to-end mobility management and security across devices, applications, data and networks.”

The ForeScout and Fiberlink MaaS360 combination provides enterprises with:

Ø Security automation to dynamically detect unmanaged devices, such as iPads, iPhones and Androids, on the network in real-time and apply controls which range from block, register as guest, segregate and initiate hosted virtual desktop (HVD) session to full MDM enrollment and on-demand device policy inspection.

Ø Automated installation of MaaS360’s MDM agent by directing users with unmanaged devices through a simple self-enrollment process.

Ø Over-the-air device configuration and corporate app catalog management to instantly provision access to corporate email, WiFi, VPN and applications.

Ø Enforcement of passcode policies and strong encryption keys to protect sensitive business and personal data on mobile devices.

Ø Mobile application blacklisting, minimum OS level verification and device feature restrictions.

Ø The ability to remotely locate, lock and fully or selectively wipe lost or stolen devices.

Ø Powerful compliance rules engine, at the device and network level, with automated responses for defined events and contextual changes.

Ø Protection of Personal Identifiable Information (PII) through sandboxing, preventing administrative access, disabling app inventory outside of corporate app catalog and deactivating location services.

Ø Unified visibility, control and compliance reporting for all mobile endpoint devices including PCs, smartphones, tablets, and laptops through the CounterACT platform.

Customers can benefit through simplified deployments of MaaS360 with CounterACT as a complete cloud-based service or a hybrid cloud approach to gain end-to-end security and centralized management. Learn more about the ForeScout, MaaS360 solution during a live webcast to be held on June 7, 2012 at 2:00pm EST. Register at - http://links.maas360.com/embracingBYOD.

ForeScout MDM, a complete cloud-based mobile device management platform, will be generally available in June at an annual subscription with prices starting at $6 per mobile device per month. ForeScout Mobile, an add-on module to CounterACT, the company’s award-winning network access control (NAC) platform, provides native device security for iOS and Android devices, as well as third party MDM integration. By providing a range of mobile security solutions, ForeScout allows IT organizations to phase in BYOD and “right size” their mobile security investments for different classes of users, devices and applications.

About Fiberlink. Fiberlink is the recognized leader in software-as-a-service (SaaS) solutions for secure enterprise mobile device and application management. Its cloud-based MaaS360 platform provides IT organizations with mobility intelligence and control over mobile devices, applications and content to enhance the mobile user experience and keep corporate data secure across smartphones, tablets and laptops. MaaS360 helps companies monitor the expanding suite of mobile operating systems, including Apple iOS, Android, BlackBerry and Windows Phone. Named by Network World as the Clear Choice Test winner for mobile device management solutions and honored with the 2012 Global Mobile Award for "Best Enterprise Mobile Service" at Mobile World Congress, MaaS360 is used to manage and secure more than one million endpoints globally. For more information, please visit http://www.maas360.com.

About ForeScout Technologies, Inc. ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout’s automated solutions for network access control (NAC), mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...