Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
8/14/2020
01:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Forescout Technologies Announces New Capabilities and Platform Updates

segmentation capabilities enable Zero Trust security across the enterprise, from cloud to edge.

SAN JOSE, Calif., Aug. 12, 2020 –– Forescout Technologies, Inc. (NASDAQ: FSCT), the leader in Enterprise of Things security, today announced new capabilities and platform updates to deliver an active defense for the Enterprise of Things (EoT) by identifying, segmenting and enforcing compliance of every connected thing. Latest innovations help accelerate Zero Trust adoption, enable IT-OT convergence, reduce threat exposure and contain breach impact.

“The modern enterprise is an Enterprise of Things. As organizations benefit from increased connectivity, they have a unique challenge of securing a complex network of desktops, laptops, servers, mobile devices, OT systems along with a rapidly expanding IoT ecosystem,” said Michael DeCesare, CEO and president, Forescout Technologies. “Forescout is setting the gold standard for securing the Enterprise of Things and giving our customers the ability to isolate, automate control and take action across any asset, anywhere, anytime to mitigate risk and operate fearlessly, without worrying about keeping critical assets online.”

Enterprise-Wide Zero Trust Segmentation

Available now, the updated platform helps accelerate Zero Trust implementation across modern enterprise environments without disruption. Forescout eyeSegment simplifies and streamlines enterprise segmentation via new integrations with Forescout eyeInspect, formerly called SilentDefense, and Medigate, a leading medical device security and asset management solution. Forescout announced its partnership with Medigate earlier this year to help healthcare organizations accurately and comprehensively identify, monitor and secure every medical device on the clinical network.

The new integrations allow organizations to reduce attack surface, maintain compliance and minimize breach impact across ITIoT, healthcare and operational technology (OT) environments. Continuous monitoring of segmentation hygiene provides an instant understanding of new risks due to the expanded interconnectivity between traditional IT, cyber-physical and clinical technology domains.

Operational Technology and Industrial Control System Protection

Forescout eyeInspect delivers new innovation in OT and ICS protection to drive increased business value by consolidating security analyst tools, correlating alerts and automating compliance tasks. Available later this year, a new purpose-built user interface streamlines network monitoring, threat alerting and risk mitigation workflows for security operations (SOC) teams. Non-disruptive segmentation within the OT network stack enables isolation of vulnerable or legacy systems, while limiting the blast radius of security exposures and ICS threats.

Policy Enforcement with Next-Generation Firewalls for IT-OT Segmentation

Forescout provides enhanced segmentation enforcement capabilities for organizations embracing IT-OT convergence via our eyeExtend modules. This enables IT and OT security analysts to collaborate on risk mitigation and to prevent threats from crossing across IT and OT domains. Customers can leverage the latest release of eyeExtend for Palo Alto Networks NGFW to integrate with Panorama network security management and VM-Series virtual firewalls, as well as use App-ID support and improved tagging for granular policy enforcement.

For details on Forescout’s Active Defense for Enterprise of Things, visit www.forescout.com.

Supporting Quote

  • “Today’s enterprise is evolving into a connected ‘enterprise of things’ driven by digital transformation, remote everywhere experience and hyper-connectivity. In this perimeter-less world, an active defense approach is needed to reduce the attack surface against an increasing level of cyber threats.” – Frank Dickson, Program Vice President, IDC, Security & Trust

Additional Resources

About Forescout

Forescout Technologies, Inc. (NASDAQ: FSCT) actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Forescout as it provides the most widely deployed, enterprise-class platform at scale across ITIoT, and OT managed and unmanaged devices. Forescout arms customers with more device intelligence than any other company in the world, allowing organizations across every industry to accurately classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets. Don’t just see it. Secure it.

The Enterprise of Things – Secured. Learn more at www.forescout.com.

© 2020 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware corporation. A list of our trademarks and patents can be found at https://www.forescout.com/company/legal/intellectual-property-patents-trademarks. Other brands, products, or service names may be trademarks or service marks of their respective owners.

 
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...