On June 15, IPM and ForeScout collaborated on a valuable best practices seminar which dug into the neglected risk exposure that comes from those forgotten office items: copiers, security cameras, projectors, HVAC systems and more. While many organizations focus large amounts of energy on the security of their user laptops, tablets and smartphones, these “hidden” endpoints can be a go-to enabler for cybercriminals.
The event, The Unusual Suspects Tour, brought together an expert line up of security thought leaders and local leaders to discuss what innovative companies are doing to transform security through greater visibility – including the ability to “see” into these forgotten endpoint devices.
Now, to put this into perspective, it’s important to summarize what ForeScout does. Everyone’s heard about the Software Defined Data Center (SDDC). For the SDDC, ForeScout delivers Software Defined End Points (SDEP). To deliver SDEP, ForeScout has multiple levels of management controls to assist in securing your network from threats. These enable IT to:
- See Endpoint Devices - ForeScout CounterACT is a network security appliance that provides IT organizations with the unique ability to see devices, including non-traditional devices (fax, copier, security devices), the instant they connect to the network.
- Control Endpoint Devices - CounterACT also provides policy-based control of these devices. CounterACT is a platform that allows for extensive policy control. The number of use cases CounterACT addresses is extensive and expanding daily. For example, if a contractor plugs a laptop into a network port CounterACT will instantly evaluate that device and move it to a VLAN that only has internet access. If a workstation has AV signature more than two versions behind it will open a ServiceNow ticket.
- Share Endpoint Device Information - The information within CounterACT can be passed to other security devices and more importantly CounterACT can request action from ATD solutions to secure your network. For example if an EPP agent is missing or broken at an end point, CounterACT alerts the EPP system to install or repair the agent. If this is unsuccessful, CounterACT will either attempt to install the EPP agent directly or it will capture the endpoint’s browser and send the user to a self-remediation page. CounterACT also notifies the EPP about unauthorized or non-compliant devices
Together, these layers of endpoint device security combine to help prevent cyber threats and minimize corporate risk. Specifically, ForeScout’s integration with other security devices allows the IT organization to automatically isolate endpoints that have a high degree of probability (as indicated by an ATD solution) of having been compromised by high-severity malware. This proactive security identification can be the lifesaver that protects your corporate enterprise from a costly attack.
If you’re interested in learning more about how ForeScout can help safeguard the endpoint devices in your organization, contact IPM. We are a leading ForeScout solution provider with extensive experience in endpoint security solutions. For more security best practices information, download this whitepaper.