Hi [[ session.user.profile.firstName ]]

Visibilität und Verwaltung von IoT-Geräten!

Das Internet der Dinge (IoT) optimiert Unternehmensprozesse und ermöglicht neue Arten der Kommunikation. Zudem ergeben sich für Organisationen neue Wege zur Kundeninteraktion. Im Jahr 2017 werden IoT-Devices die Anzahl der klassischen Endgeräte weltweit zum ersten Mal übertreffen. Im Jahr 2020 schätzt man das insgesamt 30 Milliarden Endgeräte online sein werden – dies entspricht einer Verdreifachung, hauptsächlich verursacht durch IoT. Dieser unglaubliche Anstieg vergrößert die Angriffsfläche von Netzwerken, daher müssen bestehende Sicherheitsmechanismen angepasst werden.

Besuchen Sie das Webinar Visibilität und Verwaltung von IoT-Geräten und sehen Sie Auswirkung von IoT auf deutsche Unternehmen. Mit Hilfe neuester Untersuchungen zeigen wir Ihnen, welche Sicherheitsbedenken entstehen und wie mit Sie ForeScout IoT Best-Practices umsetzen können.
Recorded Mar 1 2017 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Tarzey, Quocirca, Dir & Analyst Quocirca, & Stephen von Guendel Krone, Named Account Manager, ForeScout
Presentation preview: Visibilität und Verwaltung von IoT-Geräten!

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Move Beyond VPN to Secure your Remote Workforce Apr 2 2020 3:30 pm UTC 60 mins
    Forescout Team
    We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources. Meanwhile, security teams continue to wrestle with how to ensure security without disrupting the business. To minimize risk, every organization needs complete visibility into the security of remotely connected corporate and BYOD assets.
    Join Forescout to learn how to quickly:

    •Discover all remote devices connecting to your network, including BYOD systems
    •Identify which remotely connected devices meet your security policies, and which don’t
    •Automate policy-based controls to protect your network, even with a remote team
  • Identificar y actuar en los dispositivos de alto riesgo más rápidamente Recorded: Mar 31 2020 40 mins
    Daniel Vaquero, Systems Engineer
    La masiva expansión y proliferación de dispositivos IT, IoT y OT plantea nuevas cuestiones sobre la seguridad de la red: Es necesario identificar (e informar sobre ellos a la dirección) todos los dispositivos antiguos y vulnerables, los endpoints no conformes y mal configurados, y los dispositivos IoT y OT.

    Sin una visión completa de los dispositivos conectados en todos los dominios de red, la capacidad de actuar rápidamente para mitigar los riesgos es prácticamente nula.

    Imagine poder acceder en tiempo real a información precisa sobre los dispositivos que se conectan a su red, para identificar y actuar rápidamente respecto a los que presenten un alto riesgo y que pudieran suponer una amenaza para su organización. Vea con qué rapidez puede identificar los dispositivos IoT, segmentarlos y demostrar a la dirección cómo mitigó los riesgos durante un brote global.

    Únase a este seminario web para descubrir qué puede ayudarle a:
    • Identificar y mitigar el riesgo en la empresa ampliada, más rápidamente
    • Desplegar segmentación de red en toda la empresa, más fácilmente
    • Demo: Controlar mejor un caso de brote real
  • Maggiore rapidità di rilevamento e intervento sui dispositivi ad alto rischio Recorded: Mar 31 2020 60 mins
    Stefano Innocenti, Channel Systems Engineer - Southern Europe, Forescout Technologies
    La massiccia espansione e proliferazione dei dispositivi IT, IoT e OT impone nuove sfide alla sicurezza delle reti. Diventa imprescindibile identificare e quindi segnalare al CdA tutti i dispositivi legacy e vulnerabili, IoT e OT, così come gli endpoint non conformi e non configurati correttamente.
    Senza un quadro completo dei dispositivi connessi ai domini di rete, le possibilità di intervenire in tempi brevi per mitigare i rischi si riducono drasticamente.
    Immagina di poter accedere in tempo reale a informazioni accurate sui dispositivi che si connettono alla tua rete, per identificare e contrastare rapidamente quelli ad alto rischio che costituiscono una minaccia per la tua azienda. Scopri in quanto tempo riesci a identificare i dispositivi IoT, a segmentarli e a dimostrare al CdA la tua capacità di mitigare i rischi durante un attacco globale.
    Partecipa a questo webinar per scoprire nuovi metodi per:
    • Identificare e mitigare rapidamente i rischi nell'azienda estesa
    • Implementare facilmente la segmentazione della rete in tutta l'azienda
    • Demo: Contenere più efficacemente un attacco nel mondo reale
  • Identify and Act on High-Risk Devices – Faster Recorded: Mar 31 2020 45 mins
    Michael Morton, Systems Engineer Manager, UK, Forescout Technologies
    The mass expansion and proliferation of IT, IoT and OT devices pose new questions to network security: Legacy and vulnerable devices, noncompliant and misconfigured endpoints, and IoT and OT devices must all be identified and reported back to the board.

    Without a complete picture of connected devices across network domains, the ability to act quickly to mitigate risks is all but lost.

    Imagine you can access the right data about devices connecting to your network in real time to quickly identify and take action against high-risk devices that may pose threats to your organisation. See how quickly you can identify IoT devices, segment them and show the board how you mitigated risks during a global outbreak.

    Join this webinar to learn about ways to help you:

    - Identify and mitigate risk across the extended enterprise – Faster
    - Deploy enterprise-wide network segmentation – Easier
    - Demo: Control a real-life outbreak scenario – Better
  • Identifier et gérer plus rapidement les appareils à haut risque Recorded: Mar 31 2020 50 mins
    Philippe Mathon, Systems Engineer - France, Forescout Technologies
    L'expansion et la prolifération en masse des appareils IT, IoT et OT font naître de nouveaux défis en termes de sécurité des réseaux. En effet, tous les appareils, quels qu'ils soient (appareils d'ancienne génération et vulnérables, terminaux non conformes et mal configurés, et appareils IoT/OT), doivent pouvoir être identifiés et signalés à la direction.

    Sans une visibilité complète sur les appareils connectés aux divers domaines réseau, la capacité à intervenir rapidement pour limiter les risques est quasi nulle.

    Imaginez que vous puissiez accéder en temps réel à des données pertinentes sur les appareils connectés à votre réseau, identifier en un clin d'œil ceux à haut risque qui constituent une menace pour votre entreprise et prendre rapidement les mesures qui s'imposent. Découvrez comment identifier et segmenter rapidement les appareils IoT, mais aussi attester de votre efficacité d'intervention auprès de votre direction en cas d'attaque d'envergure mondiale.

    Au programme :
    • Identifiez et réduisez plus rapidement les risques à l'échelle de l'entreprise étendue.
    • Déployez plus facilement une segmentation réseau à l'échelle de l'entreprise.
    • Démonstration : gérez une attaque réelle plus efficacement.
  • Geräte-Erkennung und Problembehebung – Jetzt Noch Schneller Recorded: Mar 31 2020 44 mins
    Christian Rippel, Presales Engineer - DACH, Forescout Technologies
    Die starke Zunahme und Verbreitung von IT-, IoT- und OT-Geräten bringt neue Fragen zur Netzwerksicherheit mit sich: Veraltete und anfällige Geräte, nicht konforme und falsch konfigurierte Endgeräte sowie IoT- und OT-Geräte müssen ausnahmslos erkannt und dem Vorstand gemeldet werden.

    Ohne einen vollständigen Überblick über die Geräte, welche mit den verschiedenen Netzwerkdomänen verbunden sind, ist ein schnelles Handeln zur Risikominimierung praktisch nicht mehr möglich.

    Würden Sie gerne erforderliche Daten zu Geräten, die auf Ihr Netzwerk zugreifen, in Echtzeit abrufen können, um anfällige Geräte, die eine potenzielle Bedrohung für Ihr Unternehmen darstellen, schnell erkennen und entsprechende Maßnahmen ergreifen zu können? Erfahren Sie, wie Sie IoT-Geräte schnell identifizieren, segmentieren und dem Vorstand bei einem globalen Ausbruch zeigen können, wie Sie die Risiken eingedämmt haben.

    Erfahren Sie in diesem Webinar, wie Sie diese Vorteile nutzen können:
    • Schneller: Risiken in der Unternehmensumgebung identifizieren und eindämmen
    • Einfacher: Unternehmensweite Netzwerksegmentierung umsetzen
    • Besser: In einem realen Angriffszenario die Kontrolle übernehmen (Demo)
  • Identify and Act Faster – Forescout 8.2 Accelerates Risk Mitigation. Recorded: Mar 17 2020 46 mins
    Jeni Lloyd, Product Marketing & Mitesh Shah, Technical Marketing, Forescout Technologies
    Building a complete picture of your device landscape, including all device types, across siloed tools and teams, can be expensive and often impossible to achieve. However, complete situational accuracy of your device landscape is critical to accurately identifying and proactively responding to risk. CIOs, CISOs, network and security teams need a shared understanding of device insights to increase security collaboration.

    Join us to learn how Forescout 8.2 can help you identify and act – faster, by providing actionable device context to pinpoint, prioritize and quickly mitigate risk across campus, data center, cloud and OT networks.

    Session highlights:

    • Demo: Watch firsthand how Forescout 8.2 helps mitigate risk during a global outbreak
    • eyeExtend App Ecosystem: Learn how to build an integrated security strategy by leveraging community-built apps
    • Cloud-first deployments: Gain flexibility and faster time-to-value with AWS and Azure deployment options
  • Accelerate Enterprise-Wide Network Segmentation with eyeSegment Recorded: Dec 11 2019 60 mins
    Sandeep Kumar, Sr. Director of Product Marketing & Abdi Saee, Principal Product Marketing Manager
    Accelerate network segmentation projects while reducing operational complexity and minimizing business disruption.

    Forescout eyeSegment extends the capabilities of the Forescout platform to address segmentation challenges across multiple network domains and multiple enforcement technologies. It enables organizations to embrace zero trust principles for all connected devices, including IoT and OT.

    Join us to learn how Forescout eyeSegment:
    • Accelerates the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk.
    • Simplifies the process of creating context-aware segmentation policies and simulating them prior to enforcement to minimize business disruption.
    • Orchestrates segmentation controls across diverse enforcement technologies and network domains.
  • Zero Trust Security in the Age of IoT and OT Recorded: Dec 3 2019 56 mins
    Sandeep Kumar, Sr. Director of Product Marketing, Forescout Feat. Chase Cunningham, Principal Analyst, Forrester
    In its October 2019 Zero Trust eXtended Ecosystem Wave Report, Forrester calls IoT and OT device security, “one of the hardest problems to solve within the enterprise."* As unmanaged devices become commonplace on networks, security and risk professionals must rethink the concept of identity and expand their Zero Trust initiatives to include such devices.

    Watch this live webinar hosted by Forescout Senior Director of Product Marketing Sandeep Kumar, featuring Chase Cunningham of Forrester Research to learn why it’s essential to:

    • Embrace Zero Trust holistically across all types of users, devices and connected things
    • Expand the concept of identity to include IoT and OT
    • Use a context-based approach to enterprise-wide network segmentation


    *Source: The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
  • CEO Speaks: Top 5 Risks That CISOs Need to Quantify Recorded: Aug 8 2019 60 mins
    Jack Jones, Chairman of The FAIR Institute & Gaurav Pal, CEO and Founder of stackArmor
    As breaches continue to make headlines, CEOs are now being held personally accountable, often resulting in loss of job and reputation. This accountability extends to both public sector and commercial entities, especially those involved in critical infrastructure. Forescout is pleased to host a frank discussion with two experienced executives in the risk and information security industry who not only run these organizations, but also evangelize the importance of prioritizing risk from third-party and other sources.

    They will provide insight on:
    • Top risks and exposure, especially from the convergence of information technology (IT) and operational technology (OT) infrastructures.
    • How frameworks like NIST RMF and CSF play a role in establishing good risk hygiene.
    • Actionable playbook to consider when creating and presenting a risk plan to the CEO and board.
  • Reducing Cyber Risks and Complexity Through Increased Visibility Recorded: Jul 18 2019 64 mins
    Moderator: Dan Raywood Speaker: Rich Agar, Dan Lohrmann, Raef Meeuwisse
    It’s a basic truth: You can’t secure what you can’t see.™ The more you know about your network, assets and risk posture, the less likely you are to be attacked. Each unknown device extends the attack surface and can leave your converged network vulnerable. Are you ready to mitigate this risk with 100% device visibility?

    Join us on this webinar to learn how to achieve visibility of assets and devices, mitigate common risks in increasingly complex environments and operate efficiently and securely in the “security 4.0” era.

    Key takeaways:
    •Reduce business risk and disruption from security incidents and breaches
    •Improve the accuracy of your risk assessments through accurate device intelligence
    •Increase IT and OT security operations productivity
  • Livestream Video - Securing the IoT in the Age of Threats Recorded: Jun 4 2019 43 mins
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A Recorded: Jun 4 2019 8 mins
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Any merger or acquisition poses daunting challenges to IT leaders. Not only are they tasked with integrating people, processes and technology in the shortest possible time frame, they must also remain vigilant about addressing the added cybersecurity risks.

    Join this interactive 1-2-1 discussion where systems engineering expert, Wallace Sann will share how to minimise the cybersecurity risk factor in M&A including;


    Who are the key decision makers in the M&A process and what are the different/new challenges they’re facing?
    What has historically been the risk focus for acquiring companies, and how is that focus changing?
    How can companies as a whole minimize cyber risk and protect themselves during the M&A process?
    Are there any opportunities for IT teams to reduce cyber risk during an M&A?
    What does Forescout recommend companies do in order to enhance their cybersecurity posture when preparing for an acquisition?
    With the explosion of IoT devices across industries, should there be more concern around connected devices during an acquisition?
  • Using Zero Trust to Protect Financial Services Networks Recorded: Apr 15 2019 51 mins
    Tom Dolan VP, Global Financial Services Forescout & John Kindervag Founder of Zero Trust and CTO Palo Alto Networks
    Is Zero Trust really achievable given the complexity in financial service organizations, especially considering limited staff, mergers and acquisitions and compliance pressures?

    With Phil Packman, a CISO at BT, as your host, learn from the founder of Zero Trust & Field CTO at Palo Alto Networks, John Kindervag, and the VP of Global Financial Services at Forescout, Tom Dolan, how your company can more easily embrace Zero Trust to proactively combat today’s high frequency and sophistication of cyberattacks.

    Join us to learn how to:
    - Proactively combat today’s high frequency and sophistication of cyberattacks
    - Gain unparalleled situational awareness of malicious activity
    - Prevent the exfiltration of sensitive data and money
    - Simplify adherence to compliance regulations
  • Automating Security Controls with Confidence Recorded: Apr 10 2019 58 mins
    Forescout Product Team
    IT security teams are inundated with increasing numbers of security and compliance issues reported by security tools that either lack sufficient device context for prioritization or automation capabilities to enforce risk mitigation controls. As a result, highly skilled security teams waste time manually troubleshooting low-impact issues, unable to focus on proactive risk reduction or rapid threat response.

Join us to learn how Forescout 8.1 enables organizations to orchestrate actions and automate controls while minimizing business disruption. Topics include:

    • Orchestration of segmentation controls across Fortinet®, Palo Alto Networks® and Check Point® firewalls
    
• Incident response automation with ServiceNow® ITSM and Security Operations

    • Automation of controls for network access and device compliance initiatives
  • Achieving improved cybersecurity posture across IT and OT Infrastructures Recorded: Apr 2 2019 62 mins
    Moderator - Dan Raywood, Speakers - Andrew Noonan, Torry Crass
    In this webinar, we will look at the concept of why device visibility poses such a challenge for business, what is getting in the way and why OT and IT convergence has added an extra consideration.

    Key takeaways:
    •How your security strategy benefits from better device visibility
    •How compliance and risk management can be optimised
    •Unifying device visibility and control for IT and OT environments
    •Ways to improve the effectiveness of existing tools
  • Unified Device Visibility for IT and OT Environments Recorded: Mar 27 2019 48 mins
    Forescout Product Team
    As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems. 

Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
    
• Visibility and continuous monitoring of all layers of the OT network stack 

    • Auto-classification of medical, industrial, networking and IoT devices
    
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense Recorded: Dec 11 2018 61 mins
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Secure Digital Innovation of Critical Infrastructure w/o Affecting Reliability Recorded: Sep 19 2018 49 mins
    Ryan Brichant, CTO, OT Security, Wayne Dixon, Dir. OT Tech, ForeScout & Jamison Utter, Head of IoT & OT at Palo Alto Networks
    Digital innovations are aggressively being introduced into public utilities and smart city operational technology (OT) infrastructure. This creates expanded attack surfaces that introduce enormous risk across a wide array of threat vectors. Yet, since OT environments were traditionally air-gapped, there has been less emphasis on cyber security.
    It is critical to discover and protect all device connections and profiles to defend against threats that can negatively affect business operations, data, and even citizen safety. Security best practices suggest the need to continually assess connected assets and enforce the right policies for controlled access, more granular network segmentation and immediate threat response.

    Watch this Carahsoft sponsored webcast to learn from ForeScout and Palo Alto Networks how you can use non-disruptive security techniques that achieve these core security principals while prioritizing uptime of operational networks and the safety of those involved.
  • Securing the Internet of Things Recorded: Jun 5 2018 53 mins
    Joseph Carson (Thycotic) | Chris Morales (Vectra Networks) | Simon Crocker (Palo Alto Networks) | Matt Butler (ForeScout)
    The Internet of Things is everywhere - and it's an easy and frequent target of cyber attackers, as evidenced by the recent attacks on cities, industrial control systems, transportation systems, utilities and other infrastructure.

    IoT devices are built for convenience, efficiency and cost, and are riddled with vulnerabilities attackers are eager to exploit. So, who is in charge of securing the IoT? Does the responsibility lie with the manufacturer, seller, app developer, security team, or end user?

    Join the industry experts for this interactive Q&A discussion on:
    - The top IoT trends in 2018
    - Threats targeting the IoT
    - What's needed to secure connected devices
    - How to better defend our critical infrastructure from cyber warfare

    Speakers:
    - Joseph Carson, Chief Security Scientist, Thycotic
    - Matt Buller, CTO – Financial Services, ForeScout Technologies
    - Simon Crocker, Systems Engineering Director, Palo Alto Networks
    - Christopher Morales, Head of Security Analytics, Vectra Networks

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
Device Visibility & Control across the extended enterprise
The Forescout platform provides organisations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk.

Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.

Webinar languages include English, German, French, Italian and Spanish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Visibilität und Verwaltung von IoT-Geräten!
  • Live at: Mar 1 2017 3:00 pm
  • Presented by: Bob Tarzey, Quocirca, Dir & Analyst Quocirca, & Stephen von Guendel Krone, Named Account Manager, ForeScout
  • From:
Your email has been sent.
or close