Sunteți pe pagina 1din 16

Transforming Security

Through Visibility
TM

NAME
TITLE
Confluence of Macro Trends Creating Visibility Challenges
Growth of Devices and Cloud Adoption Creates IT and OT Convergence
Platform Diversity New Challenges

INFORMATION OPERATIONAL
TECHNOLOGY TECHNOLOGY
DATA CENTER
• 28Bn IP-based devices by 2020
CORPORATE HQ

CLOUD

VIRTUAL SERVERS
SERVERS
• INDUSTRIAL CONTROL
SYSTEMS

• CRITICAL
INFRASTRUCTURE

DESKTOP LAPTOP MOBILE


1990s 2020

› Innumerable device-specific operating systems (OS) › Multiple Device Locations and Access Points › OT networks are no longer physically separated

› Cannot get agents onto new devices › Heterogeneous Environment with Multiple Vendors › Threats moving between cyber and physical dimensions

› Cannot write agent-based software for every OS › De-centralized Management › Assets are highly vulnerable and rarely can be patched

2
ForeScout
Platform
Visibility & Control Gap Vulnerability

Increasing Surface Area of Attack


See: Discover, Classify, and Assess Devices on the Network

DISCOVER all IP-addressable devices at time of connec t

› Type of device › DLP agents › Version number


› Location › Patch management agents › Registry
› Connection type › Encryption agents › File name, dates, and sizes
› Hardware info › Firewall status › Services and processes installed or
› MAC and IP address › Configuration running
› Certificate › Wired, wireless, and VPN › Installed
› Name › Rogue devices › Running
› Authentication status › Type of device › Version number
› Workgroup › Manufacturer › Registry settings
CLASSIFY
› OS type devices
› Email and phone number
into
categories

› using a rich set
Connection type
Server name
of data


Files sizes
Anti-malware / virus / DLP agents
› Version number › Server OS type › Patch management agents
› Registry › Server vendor › Type of device
› File name, dates,
BYOD and sizes › IoT
Guest OS information › Corporate Managed
Location
› Services and processes installed or › Type of device › Connection type
running › Location › Hardware info
› Installed › Connection type › MAC and IP address
ASSESS
› Running device security posture › to take
Hardware info action › Certificate
› Version number › MAC and IP address › Name
› Registry settings › Certificate › Authentication status
› Files sizes › Name › Workgroup
› Anti-malware / virus / DLP agents › Authentication status ! › Email and phone number
› Patch management agents › Workgroup › OS type
› Encryption agents › Email and phone number › Encryption agents
› Firewall status › OS type › Firewall status
› Configuration › Version number › Configuration
› Wired, wireless, and VPN › Registry › Wired, wireless, and VPN
› Rogue devices › File name, dates, and sizes › Rogue devices
Corporate Managed
› Type ofPersonal
device laptop › Security
Services camera
and processes installed or › Type of device
› Manufacturer running › ManufacturerDesktop
› Connection type › Installed › Connection type
› Server name › Running › Server name
› Server OS type › Version number › Server OS type
› Server vendor › Registry settings › Server vendor
› Guest OS information › Files sizes › Guest OS information
5
› Anti-malware / virus /
Control: Implement Policies and Take Action

! NOTIFY
 Open trouble ticket

 Send email notification

 SNMP Traps

 Start application

 Run script to install application


COMPLY
 Auditable end-user acknowledgement


 Deploy a virtualhijack
HTTP browser firewall


 Reassign the device
Trigger endpoint to a VLANsystem
management

 Update access lists

!  DNS hijack (captive portal)

 Move device to a guest network


RESTRICT
Security camera
 Move device to quarantine VLAN

 Block access with 802.1x

 Alter login credentials to block access

 Block access with device authentication


Windows PC
 Turn off switch port (802.1X, SNMP)

 Wi-Fi port block


6
 Terminate applications
Orchestrate: Enhance Value of Existing Security
Solutions
+EXTENDED MODULES
EMM VA

NGFW SIEM

EPP / EDR ATD

ITSM PAM

COMPLIANCE CMT

Advanced Compliance (SCAP)

+BASE MODULES
SDN CLOUD

7
Solution #1– Network Access Control

Network
Device Network Asset Incident
Key Use Cases:
Access
Compliance Segmentation Management Response
Control
• Control access to confidential data based
on device and user profiles
ForeScout Platform
• Prevent infected or noncompliant devices
Campus Data center Cloud
Operational
technology
from spreading malware

• Automatically enforce actions for identified


situations without human involvement

ForeScout can do network access control either with 802.1x or without


802.1x. Many network devices are not ready to do 802.1x. so having a
non-.1x solution is critical.
- IT Central Station Review

8
Solution #2 – Device Compliance

Network
Device Network Asset Incident
Key Use Cases:
Access
Compliance Segmentation Management Response
Control
• Detect and take action against suspicious
or rogue endpoints the instant they access
ForeScout Platform the network

Campus Data center Cloud


Operational
technology
• Achieve device compliance without the
administrative burden or end user inconvenience
of software agents

• Control endpoint configurations according


to organizational best-practice policies and
regulatory
We use the NIST mandates
Framework for internal auditors and external
entities—CounterACT has really helped with bonding back to NIST.
- RWJBarnabas Health 2017

*IDC Business Value Analysis, December 2016

9
Solution #3 – Network Segmentation

Network
Device Network Asset Incident
Key Use Cases:
Access
Compliance Segmentation Management Response
Control
• Gain visibility into what devices are
talking to each other
ForeScout Platform
• Dynamically assign segments as the
Campus Data center Cloud
Operational network and/or devices change
technology
• Prevent select devices from
communicating to other devices in
different areas of the network across the
extended enterprise
ForeScout provides Immediate relocation of network devices to
segregated "Vendor" network based on autonomous analysis.
- IT Central Station Product Review, 2017

10
Solution #4 – Asset Management

Network
Device Network Asset Incident
Key Use Cases:
Access
Compliance Segmentation Management Response
Control
• An accurate picture of connected endpoints,
infrastructure components and BYOD/
ForeScout Platform IoT devices

Campus Data center Cloud


Operational
technology
• Rich contextual data for consumption by
operations staff or third-party tools

• Orchestration of common, closed-loop


processes with ITAM and other
complementary IT services
We found a lot of industrial control systems, HVAC, building
automation systems—a lot of devices with embedded OSs.
- State of Missouri 2017

11
Solution #5 – Incident Response

Network
Device Network Asset Incident
Key Use Cases:
Access
Compliance Segmentation Management Response
Control
• Remediate mis-configured, vulnerable & non-
compliant virtual & physical devices
ForeScout Platform
• Hunt for vulnerabilities, IOCs & other
Campus Data center Cloud
Operational
technology
attributes provided by leading threat
detection, VA & SIEM vendors

• Automate mundane IT tasks natively or in


concert with leading ITSM & security
orchestration vendors
300 hours to less than 18 hours per month reduction in user
downtime and system restoration time.
- Hillsborough Community College 2017

12
Our Product Vision

THE DEFACTO STANDARD FOR DEVICE VISIBILITY & CONTROL ACROSS THE ENTERPRISE

Campus Data Center Cloud Operational Technology

Physical Building
Laptops / Security Automation
Network Desktops Mobile Badging Servers Private Cloud Public Cloud

Users IoT Devices Virtual Servers Security Physical Controller


Equipment Systems

ForeScout Confidential – Do Not Distribute 13


Why Customers Choose ForeScout

1. Visibility
 Continuous monitoring
 Agentless deployment

2. Time-to-Value
 Rapid installation
 Existing IT systems

3. Orchestration
 Fragmentation reduction
 Automated response

14
We are a Proven Cybersecurity Partner

Gartner IoT Security Market Guide


Gartner, 2016
JP Morgan Chase Hall of Fame
Innovation Award for Transformative Deloitte’s Fastest Growing
Security Technology Companies in North America
JPMC, 2016 Deloitte, 2017
Gartner NAC Market Market Guide
Gartner, 2016

Scale Customers Licenses Net Promoter Score

1M+ 2500+ 52M+ 77


Devices in a single In over 70 Total device capacity Above industry
deployment countries sold average

15
References

• IDC Business Value Report (slides 8, 9,12) –


https://www.forescout.com/idc-business-value/
• IT Central Station (slides 8, 10) – www.itcentralstation.com
• ForeScout Customer Reference (slides 9,11,12) - https://www.forescout.com
/company/customers/

16

S-ar putea să vă placă și