Hi [[ session.user.profile.firstName ]]

An Unvarnished Assessment of ForeScout Visibility

When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

• Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
• Detection and full classification of hundreds of endpoints in seconds
• Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
• Ability to integrate with leading network infrastructure and endpoint protection technologies
Recorded Aug 4 2016 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert Smithers, Miercom President and CEO
Presentation preview: An Unvarnished Assessment of ForeScout Visibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Preparing for Tomorrow’s Threats Across the Expanded Enterprise Recorded: Jun 20 2018 40 mins
    Dave DeWalt, Former CEO, FireEye & McAfee; Rob McNutt, VP Emerg. Tech., ForeScout; Stu Solomon, Chief Tech. & Strategy, Optiv
    Cyber leaders have a massive visibility problem that is only growing as the number of corporate unmanaged IP-connected devices continues to explode. Organizations are discovering up to 60 percent more devices on their network than previously known – amidst this rapid growth, where should CISOs and CIOs focus to increase their visibility, while at the same time manage and maintain security hygiene and compliance? Add to this, the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise, and the challenge to prepare against threat actors seems overwhelming.

    In a rare opportunity to hear from an industry leader, join Dave DeWalt, former CEO of FireEye and McAfee, along with Rob McNutt, Vice President of Emerging Technologies at ForeScout, and Stuart Solomon, Chief Technology & Strategy Officer at Optiv, as they share insights and lessons on how today’s cyber leaders should be preparing for tomorrow’s expanded threats.

    Join this webinar to learn:
    - Where CISOs and CIOs should focus their resources to improve visibility
    - How device visibility can enable security hygiene and compliance
    - How organizations can shrink the attack surface created by IoT and OT
    infrastructure
  • Endpoint Detection and Response: SANS 2018 Endpoint Security Survey Recorded: Jun 19 2018 61 mins
    Sandeep Kumar, Senior Director of Product Marketing at ForeScout
    In this new 2018 endpoint survey, publishing in association with the SANS DFIR Summit, SANS revisits threats, protections and response capabilities impacting endpoints. Results are presented in a two-part webcast series. The whitepaper and webcast developed from this survey are intended to promote better endpoint hygiene and provide valuable thought leadership to the community.

    In this second installment of the 2018 endpoint survey results webcast, we uncover:

    - How organizations are monitoring their endpoints and networks to detect threats to their endpoints
    - The value of utilizing services vs on premises endpoint monitoring
    - Average time to detect and average time to fully remediate
    - Best practices to integrate remediation workflow
    - Enablers and barriers to improving endpoint protection and response capabilities
  • IoT Risk and Posture Assessment Recorded: May 29 2018 43 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Post Ransomware Crisis -Tips, Tricks, & Lessons Learned to Stay Protected Recorded: May 18 2018 33 mins
    Shawn Taylor, Sr. Systems Engineer ForeScout Technologies, Inc.
    Today, Ransomware attacks are more destructive than ever before. No organization, too large or small is safe from a potential attack. Watch this webinar to hear from our security solution expert, Senior Systems Engineer, Shawn Taylor to discuss recent ransomware breaches, the impact of those breaches, and steps you can take to better protect your organization from falling victim. In addition, you’ll discover how ForeScout’s security platform provides visibility into what’s on your network in order to and assist in identifying the potential risk that exists in your environment today.
  • Raising the Bar on Device Classification Recorded: May 15 2018 46 mins
    Mitesh Shah, Sr. Technical Marketing & Kevin Mayer, Product Management ForeScout Technologies, Inc.
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Continually Reducing Risk Despite Constant Changes Recorded: Apr 30 2018 30 mins
    Julie Cullivan CIO, ForeScout Technologies, Inc.
    IoT is forcing security leaders to re-assess how they secure their networks. Each new device that comes online represents another attack vector for enterprises and it only takes one device to compromise an entire network and disrupt business operations, which can impact the bottom line.

    Recent Forrester research commissioned by ForeScout has unveiled some hidden technical and organisational challenges IT professionals should be aware of when managing IoT devices on their networks. The survey results demonstrate a dynamic shift in the way organisations are starting to think about security and risk as it relates to IoT.

    This session will highlight some key findings from this research and outline what organisations can do to better defend IoT-enabled systems from cyberattacks.
  • Visibility for the Extended Enterprise Recorded: Apr 25 2018 39 mins
    Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc.
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • ForeScout's approach to becoming GDPR-compliant Recorded: Mar 22 2018 43 mins
    Tony Miller, Sr. Director of Legal Affairs & Jannine Mahone, Sr. Solutions Marketing Compliance, ForeScout Technologies Inc.
    More than 92 percent of multinational companies are focused on GDPR as a top priority1. ForeScout Technologies is one of them. Tony Miller, Sr. Director of Legal Affairs at ForeScout shares lessons learned in ForeScout's quest to assure data privacy and become GDPR compliant. This informal event will be in the form of questions and answers.
  • Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Recorded: Mar 21 2018 29 mins
    Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • The Good, the Bad, & the Downright Dangerous: IoT & Healthcare Recorded: Mar 6 2018 22 mins
    Vice President of Americas, Systems Engineering, Forescout Technologies, Inc.
    Organizations are struggling to wrap programs to increase the base level security on all devices, then Automate more process, and share more information with internal and external customers. This demands a fresh look at how operations teams works together including: share information better, improve patient care, streamline auditing all devices, and apply policy while still stretching the IT budget. The medical industry is at the precipice of the IoT and corporate networks.
  • Reduce Risk with Privileged Account Security & Continuous Visibility Recorded: Feb 7 2018 44 mins
    Aytug Celikbas, Sales Engineer, CyberArk & Jim Higginbottom, Director Global Alliances, ForeScout
    With the threat landscape expanding every second, protecting the “keys to the kingdom” is vital to securing your business and its assets. Unsecured privileged accounts affords cyber criminals access to your highest value assets and data. Join your host, Conexsys Communications, to learn how CyberArk and ForeScout address this issue by reducing the attack surface. ForeScout scans the network in real time and automates policy-driven access control based on device security posture and behavior without using an agent. For over a decade CyberArk has led the market in securing enterprises against cyber attacks that take cover behind insider privileges and attack critical enterprise assets.
  • Preventing Cyberattacks via Dynamic Network Segmentation Recorded: Oct 16 2017 49 mins
    Ward Holloway, ForeScout Technologies & Chris Ebley, Managing Partner, BAI & Lee Space, Palo Alto Networks
    In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
    Webinar topics include:
    - Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
    - Risk prevention architecture considerations
    - Best practices based on real world experiences

    BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
  • Securing Smart Transportation to Protect Your Community Recorded: Oct 2 2017 43 mins
    Ryan Brichant, VP & CTO of Cyber Security, ForeScout & Ashok Sankar, Director of Public Sector Solutions & Strategy, Splunk
    The US Department of Homeland Security has identified transportation as one of three top sectors in creating a Smart City. The Department also addressed the fact that the same technologies driving this digital transformation - smart sensors, fare collection systems, power relays, HVAC, cameras, and other unmanaged IoT devices – are also expanding the cyber attack surface and pose significant security risks to both citizens and critical assets. The challenge before transportation administrators, state and local officials and security and IT experts is how to enable these beneficial systems while also ensuring optimum security protections.

    Join us for this insightful webinar on the state of Smart Transportation initiatives and how you can gain the visibility and control you need to drive both Smart AND Secure Transportation to benefit your community.

    Webinar topics include:
    - The risks and challenges of new technologies and IoT inherent with Smart Transportation
    - How real-time end-to-end visibility can offer critical situational awareness needed to reduce and manage risks
    - Real world experiences
  • Gain Real-Time Vulnerability Assessment for Rapid Response to Security Threats Recorded: Sep 25 2017 50 mins
    John Chirhart, Federal Technical Director, Tenable & Ellen Sundra, RVP of Systems Engineering PubSec, ForeScout Technologies
    Whether you’re an information security, compliance or IT executive, your job is harder than it’s ever been before. Regardless of your organization’s size or industry, there is a lack of immunity against the increasingly advanced threat environment.

    The number of data breaches reported today is growing at a rapid pace – as are the associated costs. At the same time, regulatory mandates continue to evolve. Yet, even with most organizations spending significant money on people and technology, the bad guys keep getting through.

    Join industry experts John Chirhart, Tenable and Ellen Sundra, ForeScout, on June 14 and discover how to:

    - Reduce security risk through faster, automated vulnerability scans of newly introduced systems on your network
    - Improve efficiency by focusing vulnerability scans on newly detected systems and on systems that have changed since the last scan
    - Increase ability to identify and eliminate vulnerable systems in hard to reach or unknown areas within your network
    - Orchestrate multi-system security
  • Staying Secure in the Era of Smart Things Recorded: Sep 14 2017 62 mins
    Shawn Taylor, PubSec SE, ForeScout, John MacMichael, CISO, DC Gov, Geoff Brown, CISO, City of NY
    As the world grows more interconnected by the day, security practitioners need to see beyond the network. The Internet of Things is presenting organizations with a threat landscape they’ve never seen before. We’ve entered an uber-connected world of sensors, cameras and other various data collection systems...making their jobs harder than ever before.

    Find out how City and Municipality organizations are learning to become flexible and nimble as they harness the future, all while maintaining the security needed to protect the data deluge from billions of sensors and devices.

    In this webinar, you will learn:

    - How you can easily gain visibility to all of the devices connecting to your network
    - Increase the security posture of your organization by enforcing policies around compliance without the use of agents
    - How to operationalize your organization so your security is dynamic and adaptable to change
  • Extending Agentless Visibility and Control Across Campus, Data Center and Cloud Recorded: Sep 11 2017 44 mins
    Sandeep Kumar, Director of Product Marketing, ForeScout Technologies
    To support the exponential growth of IoT, operational technology (OT) and virtualization on enterprise networks, ForeScout has new product features and technology partnerships to help keep the evolving enterprise infrastructure secure.

    Join Sandeep Kumar, ForeScout’s Director of Product Marketing, as he provides an in-depth update on ForeScout’s latest product advancements and how customers can benefit:

    - Advanced out-of-the box device classification with new taxonomy for IoT and OT devices
    - Enterprise scale and resiliency to manage over one million devices per deployment with new failover capability
    - Enhanced user interface for consolidated visibility, policy management and controls across heterogeneous infrastructures
    - Expanded collaboration with VMware and AWS to extend visibility and control across software-defined data centers and public cloud
  • Using Agentless Visibility to Simplify Network Segmentation Recorded: Aug 30 2017 18 mins
    Eric Nelson, Manager, Systems Engineering, ForeScout Technologies
    Network segmentation projects are on everyone’s radar for 2017 since outside-in perimeter security technologies such as firewalls, intrusion prevention systems and advance threat protection systems are unable to prevent some of the recent notable cyberattacks. Once threats are inside a flat network, they can roam and spread freely. Segmentation is a best practice to contain these threats and protect network resources. This 40-minute seminar will share the key areas for effective network segmentation, including:
    • Using agentless visibility and granular device classification to define profiles, roles and zones
    • Leveraging existing infrastructure investments to segment today’s flat networks
    •  Automating and maintaining network segmentation hygiene with ForeScout CounterACT®
  • Gaining Compliance with DFARs Recorded: Aug 24 2017 49 mins
    Heather Engel, Chief Strategy Officer, Sera-Brynn
    U.S. Defense Contractors and soon all Federal Agencies will be required to meet the DFARS 7012 mandate with critical cybersecurity controls against NIST 800-171. The overwhelming challenges presented by these stringent guidelines are having a major impact on the contracting community which supports our warfighters. These requirements must be implemented by December 31, 2017.
  • Transforming K-12 Cybersecurity Through Visibility Recorded: Aug 1 2017 50 mins
    Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Global Partner Program Recorded: Jun 30 2017 10 mins
    Todd DeBell, VP of Global Channel Sales
    Todd DeBell, ForeScout’s VP of Global Channel Sales, walks you through the details of our new partner program – ForeScout Forward Partner Program. Todd will cover key highlights, what’s new, including incentive rewards, sales and pre-sales technical enablement offerings, marketing development funds, and more. This session is relevant to ForeScout Value Added Resellers across the globe, in which you’ll learn about the commitment we are making to support your business and help drive profitability.
ForeScout
ForeScout

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: An Unvarnished Assessment of ForeScout Visibility
  • Live at: Aug 4 2016 6:00 pm
  • Presented by: Robert Smithers, Miercom President and CEO
  • From:
Your email has been sent.
or close