Hi [[ session.user.profile.firstName ]]

ForeScout APAC

  • Date
  • Rating
  • Views
  • IoT Risk and Posture Assessment
    IoT Risk and Posture Assessment Len Rosenberg, Vice President Engineering, ForeScout Technologies Recorded: Jul 11 2018 43 mins
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Raising the Bar on Device Classification
    Raising the Bar on Device Classification Steve Hunter, Sr. Director Systems Engineering, ForeScout Technologies Recorded: Jun 27 2018 34 mins
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Visibility for the Extended Enterprise
    Visibility for the Extended Enterprise Steve Hunter, Sr. Director Systems Engineering, ForeScout Technologies Recorded: Jun 19 2018 38 mins
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • 使用网络安全策略网络分段,阻止恶意软件扩散
    使用网络安全策略网络分段,阻止恶意软件扩散 Rui Wang, 系统工程师 & David Leung, 资深系统工程师 Recorded: May 29 2018 84 mins
    一旦恶意软件突破了网络防御边际,就很难阻止它们攻击其他的内网设备,而且他们能潜伏在您的网络中长达数日,数周,甚至是数月。在您的网络中,每一个网络设备都很可能成为潜在的攻击对象。

    我们必须侦查到每个网络终端节点而且实施保护措施,包括每一个受管控的设备到非受管控的系统乃至物联网设备。加入我们五月二十九日的讲座,我们会展示如何最大限度的减少网络相关攻击和漏洞,以及如何保护您的企业免受恶意软件的攻击。

    •使用无代理的完全网络可视性以及细致的设备分类,去定义网络设备的功能角色和区域
    •无需安装代理,强力执行企业的网络安全策略,控制终端行为。
    •利用企业中现有的网络安全设备直接加强可视性和减少修复时间。
  • 通过能见度改变网络安全
    通过能见度改变网络安全 主讲人:王睿 Forescout 系统工程师 Recorded: Nov 16 2017 60 mins
    通过可视性 改变网络安全
    大家是否都觉得黑客们拥有攻无不克的能力呢?尽管我们在网络安全的投入不断增加,然而
    我们还是看到网络攻击和数据泄露事件越来越多。 因此我们必须增强网络安全,如何才能做到呢?欲要加强我们的网络安全,先从可视性开始。在我们的讲座里,您会更加了解我们Forescout如果通过加强公司内网,园区,数据中心,还有云端网络的可视性去实现:

    •100% 可视。在极短的时间内,不依靠终端软件发现所有的网络设备。这些包括: managed devices, BYOD, IoT, OT, 甚至是VM。 当以上设备一接入网络即可发现,并且实时监控。
    •可控。按照公司的网络安全策略及其设备的属性和状态进行自动化准入管控。自动修复高安全风险设备。
    •联动。与您现在已有的安全设备共享实时数据有效监控所有网络设备。

Embed in website or blog