Hi [[ session.user.profile.firstName ]]

NAC moderno vs. tradicional

El número de dispositivos no gestionados supera ampliamente al de dispositivos gestionados. Estos dispositivos no se autentican mediante los métodos tradicionales cuando se conectan a la red. Por lo tanto, no pueden identificarse con el proceso de autenticación.

El control de acceso a la red (NAC) moderno ofrece una amplia variedad de funciones esenciales que van desde la identificación, las evaluaciones de estado y el cumplimiento, hasta la supervisión de los dispositivos conectados y las respuestas automatizadas. Un enfoque moderno del control de acceso a la red (NAC) puede mejorar su higiene de seguridad, impidiendo que se conecten a su red dispositivos no autorizados, no fiables o que suplantan a otros. Además, en su Guía de mercado NAC de 2020, Gartner recomienda que las organizaciones "adapten los proyectos de NAC a cualquier iniciativa de seguridad Zero Trust".

Únase a este seminario web para descubrir cómo:
• Identificar, clasificar e inventariar todos los dispositivos
• Evaluar el estado de seguridad y cumplimiento de normativas
• Controlar el acceso entre redes heterogéneas
Recorded Jul 8 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ricardo Hernández, Forescout Technologies
Presentation preview: NAC moderno vs. tradicional

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reduce Risk w/Automated Enterprise Asset Intel & Context-Aware Incident Response Sep 16 2020 3:00 pm UTC 60 mins
    Karl Klaessig, Dir. Product Mktg, Security Operations, ServiceNow and Shawn Taylor, Sr. SE, Forescout Technologies
    In today’s era of aggressive digital transformation, how can you maintain continuous asset accountability and streamline security workflows as the IT, IoT and OT connected device landscape rapidly grows and changes? Environments like healthcare, industrial, utilities, manufacturing and critical infrastructure must always address this need while also ensuring the integrity of business and security operations, otherwise risk significant financial losses or more dangerous perils. In this webinar, we will discuss how to achieve the following without operational disruption or re-designing your network.
    • Maintain continuous IT, IoT & OT asset accuracy
    • Automate policy/compliance enforcement and incident response
    • Dynamically control network access and segmentation
  • Seguridad Zero Trust para dispositivos IoT Sep 15 2020 2:00 pm UTC 45 mins
    Arturo Guillén, Systems Engineer, Forescout Technologies
    Implementar una estrategia de confianza cero o desconfianza total, lo que se conoce como "Zero Trust", puede ser difícil, sobre todo si tenemos en cuenta el aumento del número de dispositivos IoT y OT en las redes empresariales.

    Según Gartner en un informe del 2019, "casi el 20 % de las empresas han sufrido al menos un ataque basado en el Internet de las cosas (IoT) en los tres últimos años".

    Para minimizar el riesgo de una fuga de datos, los equipos de seguridad deben garantizar que se adopten las medidas adecuadas para proteger de manera proactiva los dispositivos IoT.

    Descubra cómo sería la implementación de una estrategia Zero Trust para sus dispositivos IoT.

    Únase a nuestro seminario web para aprender a:
    • Identificar y clasificar los dispositivos IoT
    • Crear zonas de confianza para todos los dispositivos de su red
    • Aplicar una política de limitación de privilegios al mínimo
    • Supervisar continuamente la actividad para detectar anomalías
    • Organizar y automatizar las respuestas
  • Zero-Trust-Sicherheit für IoT-Geräte Sep 15 2020 1:00 pm UTC 45 mins
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • Sicurezza Zero Trust per i dispositivi IoT Sep 15 2020 12:00 pm UTC 45 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    L’implementazione di un approccio Zero Trust non è semplice, considerando il crescente numero di dispositivi IoT e OT collegati alle reti aziendali.

    Secondo Gartner “quasi il 20% delle aziende ha subito almeno un attacco basato contro dispositivi IoT (Internet of Things) negli ultimi tre anni.” (Gartner 2019).

    Per ridurre il rischio di una violazione, i team della sicurezza devono proteggere proattivamente i dispositivi IoT con misure adeguate.

    Scopri come potrebbe essere l’implementazione di un approccio Zero Trust per i dispositivi IoT della tua azienda.

    Partecipa al nostro webinar nel corso del quale saranno affrontati i seguenti argomenti:
    • Identificazione e classificazione dei dispositivi IoT
    • Creazione di zone di fiducia per tutti i dispositivi collegati alla tua rete
    • Applicazione di policy basate sul principio del privilegio minimo
    • Monitoraggio costante delle attività anomale
    • Orchestrazione e automazione degli interventi
  • Zero Trust Security for IoT Devices (in Hebrew) Sep 15 2020 10:00 am UTC 45 mins
    Ido Brana, Regional Account Manager, Forescout Technologies & Kobi Ganli, Systems Engineer, Forescout Technologies
    Achieving full Zero Trust enforcement can be challenging, considering the growing number of IoT and OT devices on corporate networks.

    Gartner states that “nearly 20% of organizations observed at least one Internet of Things (IoT)-based attack in the past three years.” (Gartner, 2019)

    To minimize the risk of a breach, security teams must ensure the right measures are put in place to proactively protect IoT devices.

    Find out what implementing a Zero Trust approach for IoT devices could look like for you.

    Join our webinar to learn how you can:
    • Identify and classify IoT devices
    • Create trust zones for all the devices on your network
    • Enforce least privilege policies
    • Continuously monitor for anomalous activity
    • Orchestrate and automate responses
  • Zero Trust Security for IoT Devices Sep 15 2020 9:00 am UTC 45 mins
    Rich Agar, Systems Engineer, Forescout Technologies
    Achieving full Zero Trust enforcement can be challenging, considering the growing number of IoT and OT devices on corporate networks.

    Gartner states that “nearly 20% of organizations observed at least one Internet of Things (IoT)-based attack in the past three years.” (Gartner, 2019)

    To minimize the risk of a breach, security teams must ensure the right measures are put in place to proactively protect IoT devices.

    Find out what implementing a Zero Trust approach for IoT devices could look like for you.

    Join our webinar to learn how you can:
    • Identify and classify IoT devices
    • Create trust zones for all the devices on your network
    • Enforce least privilege policies
    • Continuously monitor for anomalous activity
    • Orchestrate and automate responses
  • Sécurité Zero Trust pour les appareils IoT Sep 15 2020 8:00 am UTC 45 mins
    Philippe Mathon, Systems Engineer, Forescout Technologies
    La mise en œuvre d’une approche Zero Trust n’est pas chose facile compte tenu du nombre croissant d’appareils IoT et OT connectés aux réseaux d’entreprise.

    Selon Gartner, « près de 20 % des entreprises ont subi au moins une attaque ciblant des appareils IoT (Internet des objets) au cours des trois dernières années ». (Gartner, 2019)

    Pour limiter le risque de compromission, les équipes de sécurité doivent protéger proactivement les appareils IoT au moyen de mesures adaptées.

    Découvrez à quoi pourrait ressembler l’implémentation d’une approche Zero Trust pour les appareils IoT de votre entreprise.

    Participez à notre webinar, au cours duquel les thèmes suivants seront abordés :
    • Identification et classification des appareils IoT
    • Création de zones de confiance pour tous les appareils connectés à votre réseau
    • Application de politiques basées sur le principe du moindre privilège
    • Surveillance continue des activités anormales
    • Orchestration et automatisation des interventions
  • Modern NAC for Modern Networks Recorded: Aug 5 2020 47 mins
    Mitesh Shah, Principal Technical Marketing Manager and Tamer Baker, Principal Systems Engineer, Forescout Technologies Inc.
    Today’s enterprises need to enforce Zero Trust access on heterogeneous networks for a vast array of computers, mobile, guest and BYOD systems and a growing list of IoT devices. In other words, their Enterprise of Things. Most of these devices do not authenticate using traditional methods when they connect to the network. Hence, a newer and modern approach is required to secure these diverse sets of devices regardless of their connection type – wired, wireless or VPN.

    Modern NAC spans a range of essential capabilities – from providing comprehensive visibility, assessing security posture and compliance, to flexible options for enforcing access policies in any heterogeneous network. A modern NAC approach can dramatically improve your security by preventing unauthorized, noncompliant and impersonating devices from connecting to your network.

    Forescout provides the most flexible, robust and popular NAC platform in the market. Join this webinar to learn how Forescout can deliver tangible results quickly and in a non-disruptive manner, and how Forescout helps you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • Securing your Enterprise during and post-Covid19 Recorded: Jul 9 2020 21 mins
    Ahmed Abdelmotaleb, System Engineer - METAR at Forescout Technologies
    With the new security challenges of the increasing connected devices, enterprises have been facing a seismic shift in the remote workforce during and after COVID-19. Unmanaged device growth is vastly outpacing managed devices. These devices do not authenticate using traditional methods when they connect to the network. Hence, they cannot be identified via the authentication process.

    Modern NAC spans a range of essential capabilities – from identification, posture and compliance assessments, and monitoring of connected devices all the way to automated responses. A modern NAC approach can improve your security hygiene by preventing unauthorized, rogue and impersonating devices from connecting to your network.

    Join this webinar to learn about ways to help you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • NAC moderno vs. tradicional Recorded: Jul 8 2020 51 mins
    Ricardo Hernández, Forescout Technologies
    El número de dispositivos no gestionados supera ampliamente al de dispositivos gestionados. Estos dispositivos no se autentican mediante los métodos tradicionales cuando se conectan a la red. Por lo tanto, no pueden identificarse con el proceso de autenticación.

    El control de acceso a la red (NAC) moderno ofrece una amplia variedad de funciones esenciales que van desde la identificación, las evaluaciones de estado y el cumplimiento, hasta la supervisión de los dispositivos conectados y las respuestas automatizadas. Un enfoque moderno del control de acceso a la red (NAC) puede mejorar su higiene de seguridad, impidiendo que se conecten a su red dispositivos no autorizados, no fiables o que suplantan a otros. Además, en su Guía de mercado NAC de 2020, Gartner recomienda que las organizaciones "adapten los proyectos de NAC a cualquier iniciativa de seguridad Zero Trust".

    Únase a este seminario web para descubrir cómo:
    • Identificar, clasificar e inventariar todos los dispositivos
    • Evaluar el estado de seguridad y cumplimiento de normativas
    • Controlar el acceso entre redes heterogéneas
  • Modern vs. Traditional NAC Recorded: Jul 8 2020 36 mins
    Keith Gilbert, Systems Engineer, Forescout Technologies
    Unmanaged device growth is vastly outpacing managed devices. These devices do not authenticate using traditional methods when they connect to the network. Hence, they cannot be identified via the authentication process.

    Modern NAC spans a range of essential capabilities – from identification, posture and compliance assessments, and monitoring of connected devices all the way to automated responses. A modern NAC approach can improve your security hygiene by preventing unauthorized, rogue and impersonating devices from connecting to your network. In addition, in its 2020 NAC Market Guide, Gartner recommends that organisations, “align NAC projects with any Zero Trust security initiative”.

    Join this webinar to learn about ways to help you:
    • Discover, classify and inventory all devices
    • Assess security posture and enforce compliance
    • Control access across heterogeneous networks
  • Soluzioni NAC tradizionali e moderne a confronto Recorded: Jul 8 2020 57 mins
    Stefano Innocenti, Channel Systems Engineer, Forescout Technologies
    Il numero di dispositivi non gestiti sta superando abbondantemente il numero di quelli gestiti. Quando si connettono alla rete, i dispositivi non gestiti non possono essere autenticati con metodi tradizionali pertanto, sfuggono al tradizionale processo di autenticazione.

    La moderna tecnologia NAC, cioè di controllo degli accessi alla rete, copre un'ampia gamma di funzionalità essenziali rivolte ai dispositivi, come l'identificazione, la valutazione dello stato di sicurezza e conformità, il monitoraggio dei dispositivi connessi fino alle risposte automatizzate. Una moderna strategia di controllo degli accessi alla rete concorre a migliorare lo stato di sicurezza globale impedendo l'ingresso in rete di dispositivi non autorizzati, inaffidabili o che si spacciano per legittimi. Tra l'altro, nella sua guida al Mercato NAC per il 2020 Gartner raccomanda alle aziende di "allineare i progetti NAC a qualsiasi iniziativa di sicurezza Zero Trust".

    Partecipa a questo webinar per scoprire nuovi metodi per:
    • Scoprire, classificare e inserire in un inventario tutti i dispositivi connessi
    • Valutare lo stato di sicurezza e imporre la conformità
    • Controllare gli accessi in reti eterogenee
  • NAC neu überdacht Recorded: Jul 8 2020 40 mins
    Christian Rippel, Presales Engineer, Forescout Technologies
    Die Anzahl nicht verwalteter Geräte wächst exponentiell. Diese Geräte authentifizieren sich beim Verbinden mit dem Netzwerk nicht mithilfe herkömmlicher Methoden und können daher beim Authentifizierungsprozess nicht identifiziert werden.

    Moderne NAC-Lösungen bieten unverzichtbare Funktionen wie Identifizierung, Einstufung der Sicherheitslage und Konformität sowie Überwachung aller verbundener Geräte bis hin zu automatisierten Problembehebungsmaßnahmen.

    Ein moderner NAC-Ansatz kann Ihre Sicherheitsmaßnahmen verbessern, indem er unberechtigten, nicht autorisierten Geräten die Verbindung mit dem Netzwerk verweigert. Im Sinne der Empfehlung des NAC-Marktleitfadens für 2020 von Gartner empfiehlt es sich, NAC-Projekte mit allen Zero-Trust-Sicherheitsinitiativen abzustimmen.

    Erfahren Sie in diesem Webinar, wie Sie diese Vorteile für sich nutzen können:
    • Erkennung, Klassifizierung und Bestandserfassung aller per IP-Adresse verbundener Geräte
    • Einstufung der Sicherheitslage und Einhaltung von Konformitätsrichtlinien
    • Zugriffskontrolle in heterogenen Unternehmensnetzwerken
  • NAC moderne contre NAC traditionnel Recorded: Jul 8 2020 42 mins
    Cédric Antoine, Systems Engineer, Forescout Technologies
    Le nombre d’appareils non gérés dépasse largement celui des appareils gérés. Ces appareils, lorsqu’ils se connectent au réseau, ne s’authentifient pas à l’aide des méthodes traditionnelles. Par conséquent, ils échappent à l’identification du processus d’authentification.

    Les solutions NAC modernes offrent un large éventail de fonctionnalités essentielles : identification, évaluation du niveau de sécurité et de conformité, surveillance des appareils connectés, automatisation des actions d’intervention. Une stratégie basée sur un NAC moderne peut améliorer vos pratiques de sécurité en empêchant les appareils non autorisés, non approuvés et faussement légitimes de se connecter à votre réseau. En outre, dans son Guide 2020 du marché des solutions de contrôle d’accès au réseau, Gartner recommande aux entreprises « d’aligner leurs projets NAC sur leurs éventuelles initiatives de sécurité Zero Trust ».

    Rejoignez ce webinaire pour apprendre comment vous pouvez :
    • découvrir, classifier et répertorier tous les appareils ;
    • évaluer leur niveau de sécurité et vous assurer qu’ils sont conformes ;
    • contrôler l’accès aux réseaux hétérogènes.
  • Cybersecurity Round Table – How to Secure Networks in 2020 and Beyond Recorded: Jun 29 2020 46 mins
    Experts from around the world, moderated by Dr. Jessica Barker
    In this multidisciplinary panel cyber experts from the industry and large organizations will discuss the main security challenges of today and share best-practices to cope with these in 2020 and beyond. Topics to be addressed are Zero Trust Networking, Impact of New Technologies, Security Challenges in a Post COVID-19 Era.

    Watch the recording of this roundtable broadcasted during our virtual Cybersecurity Vision event in May 2020.

    The keynote referenced in the panel can be found here: https://www.forescout.com/company/events/emea-webinars/?commid=423371
  • Cybersecurity Trends and Vision in a Fast-Changing Society Recorded: Jun 29 2020 41 mins
    Myles Bray, Vice President EMEA – Forescout Technologies
    To say that we live in “challenging” times is a large understatement – as the COVID-19 outbreak showed us how quickly we need to be able to adapt to changes, both private and business wise.

    The last years have been characterized by explosive proliferation of devices that reside on corporate networks. IoT- and OT-devices join networks by the millions or billions every year. All kinds of endpoint applications, operating systems and virtual instances must be monitored to make sure they don’t go rogue. New technologies like 5G and Wi-Fi 6, that will facilitate the adoption of IoT and OT even faster, are around the corner. And one can expect that Post COVID-19, these trends will further accelerate.

    What’s more, all this activity is happening on greatly expanded, tremendously complex extended networks and your corporate network has transitioned from a single entity to become a network of networks.

    Watch the recording of this presentation broadcasted during our virtual Cybersecurity Vision event in May 2020.
  • Security in the IT-OT Era, Device Visibility and Control Recorded: Jun 29 2020 26 mins
    Bob Reny, EMEA CTO – Forescout Technologies
    It’s a basic truth: You can’t secure what you can’t see.

    Attackers are continuously searching for unmanaged and unsecured devices, and they will eventually find and exploit your blind spots. Visibility and control are the cornerstones of security and compliance. Organizations everywhere are realizing that they have a massive and growing visibility gap. With billions of IoT and OT devices coming and going from enterprise networks, agentless device visibility is essential.

    Through a live demo we will show how you can identify and manage IT- and OT-devices as soon as they connect to the network.

    Watch the recording of this presentation broadcasted during our virtual Cybersecurity Vision event in May 2020.
  • Arista & Forescout: Network Security Redefined Recorded: Jun 29 2020 37 mins
    Andrew Noonan, Manager Central SE team – Forescout Technologies
    Arista and Forescout have joined forces to reduce risk by providing policy-driven access control and segmentation across campus, datacenter, cloud and OT networks. Arista is leveraging its cloud networking principles to bring resiliency, consistency and automation to campus networks.

    With the combination of Arista and Forescout, customers can enhance network operations with Arista capabilities while also leveraging Forescout’s enterprise-wide device visibility and policy management. This enables you to boost network performance, increase compliance and secure heterogenous networks.

    Watch the recording of this presentation broadcasted during our virtual Cybersecurity Vision event in May 2020.
  • Transforming Enterprise-Wide Network Segmentation Recorded: Jun 29 2020 43 mins
    Doug Card, Senior Product Manager eyeSegment – Forescout Technologies
    CISOs are faced with the challenges of a growing number of threats while meeting more and more compliance directives. The new era of network segmentation has been designed to allow businesses to automate the identification and isolation of threats, without impacting operations. Despite network segmentation not being a new concept, adoption across the enterprise has been slow and when undertaken, often tedious – as typically organizations layer network segmentation on top of an existing network.
    Advanced network segmentation requires traffic context. Having insight into what devices are communicating between each other and what counts as legitimate or illegitimate traffic is paramount for CISOs today. Forescout’s eyeSegment allows organizations to create a baseline of what is communicating with what and helps make sense of the network chaos associated with the volume and diversity of connected devices, matching the demand from businesses to secure critical applications, mitigate increased exposure due to IoT devices and block the lateral movement of threats across flat networks.
  • What You Need to Know about Ripple20 Recorded: Jun 25 2020 38 mins
    Shlomi Oberman, CEO & Researcher, JSOF & Daniel dos Santos, Security Researcher, Forescout Technologies
    A Conversation with Shlomi Oberman from JSOF

    According to Gartner, “over 80% of organizations currently use IoT to solve business use cases, and almost 20% of organizations have already detected an IoT-based attack in the past three years.” By now, you’ve heard about Ripple20 – the collective group of vulnerabilities in a widely used Transmission Control Protocol/Internet Protocol (TCP/IP) software library developed by Treck Inc., and discovered by a team at JSOF.

    JSOF partnered with Forescout Research Labs to use Forescout’s Device Cloud, a unique data lake with information from more than 12 million devices categorized in more than 150 device types, to identify potentially impacted vendors and devices. Tens of millions of devices across over 50 vendors may be affected, exposing a complex supply chain for IoT devices. Additionally, threat actors could execute remote commands against devices connected to the internet, compromise them and move laterally within the network to access or infect other devices.

    How do security teams respond swiftly to identify and mitigate these vulnerable devices?

    Join us for a lively conversation with Shlomi Oberman (JSOF) and Daniel dos Santos (Forescout) as they explain:
    • What really is Ripple20? – a deep dive into discovered vulnerabilities
    • The impact on the supply chain and the impacted vendors
    • How to mitigate the risks – even in environments where these devices cannot be patched
    • What vendors and security teams must do next to limit their exposure
Device Visibility & Control across the extended enterprise
The Forescout platform provides organisations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk.

Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.

Webinar languages include English, German, French, Italian and Spanish.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: NAC moderno vs. tradicional
  • Live at: Jul 8 2020 2:00 pm
  • Presented by: Ricardo Hernández, Forescout Technologies
  • From:
Your email has been sent.
or close