Hi [[ session.user.profile.firstName ]]

Move Beyond VPN to Secure your Remote Workforce

We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources. Meanwhile, security teams continue to wrestle with how to ensure security without disrupting the business. To minimize risk, every organization needs complete visibility into the security of remotely connected corporate and BYOD assets.
Join Forescout to learn how to quickly:

•Discover all remote devices connecting to your network, including BYOD systems
•Identify which remotely connected devices meet your security policies, and which don’t
•Automate policy-based controls to protect your network, even with a remote team
Recorded Apr 7 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Hunter, Sr. Director Systems Engineering APJ , Forescout Technologies
Presentation preview: Move Beyond VPN to Secure your Remote Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Future of Network Performance, Security and Management Efficiency Recorded: Jun 16 2020 63 mins
    Steve Hunter, Sr Dir, Sys Engr APJ, Forescout & Richard Bayliss, Dir of Sys Engr, APJ, Arista Networks
    Join Arista and Forescout to learn how to reduce cyber risk and increase operational efficiency by providing policy driven network access control (NAC), cognitive network management and dynamic segmentation across campus, data center and cloud environments. Achieve benefits such as boost network performance, increase compliance and better secure heterogeneous networks by:

    • Improving visibility and control of devices on wired, wireless and VPN networks
    • Increasing security and reducing operating expense
    • Accelerating incident response and Zero Trust enforcement
  • いま企業全体に求められるゼロトラストモデル 〜5つのステップとフォアスカウト のアプローチ〜 Recorded: Jun 5 2020 22 mins
    フォアスカウト テクノロジーズ SE寺川
    ウェビナーについて:
    2010年Forrester Research社により開発、推奨されているゼロトラスト ネットワークの定義について詳しく解説。複雑に構成された現代の企業ネットワークにおいて、既存の境界ベースセキュリティモデルでは、巧妙化したセキュリティ攻撃に対応するには不十分である事が浮き彫りになってきています。今ウェビナーでは、このような事実を踏まえ、なぜ今後ゼロトラストネットワークモデルが有効とされているのかを5つのステップで解説していきます。

    - ゼロトラストとは?
    - なぜゼロトラストモデルが必要か?
    - ゼロトラスト実現に向けて5つのステップ
  • Forescout and Medigate - Safely Securing Healthcare Organisations Recorded: May 21 2020 45 mins
    SME’s: Hamish Armati (Forescout) and Offir Levy (Medigate)
    Join us to learn how Forescout and Medigate together are safely securing healthcare organisations with continuous device insight and automated policy enforcement.

    Forescout and Medigate have joined forces to provide a unique solution for healthcare organizations that continuously discovers, assesses and classifies all IoMT, IoT, operational technology (OT) and IT devices, streamlining and simplifying management while also mitigating risk of compromise across heterogeneous device types and network tiers.
  • Implementing Network Segmentation Recorded: May 14 2020 40 mins
    Steve Hunter, Senior Director, System Engineering APJ, Forescout Technologies
    Successfully implement enterprise-wide network segmentation while reducing operational complexity and minimizing business disruption. The Forescout platform and its eyeSegment product address organizations’ cross-domain, multi-use-case segmentation challenges across extended enterprises. Through context-aware policies, real-time visualizations, business-structured groups and proactive policy simulations, the Forescout platform enables segmentation controls that span diverse enforcement technologies and validate expected outcomes.

    Join us to:
    - Explore different approaches and best practices around dynamic network segmentation across the extended enterprise
    - Learn about the latest enhancements and capabilities in Forescout eyeSegment, which helps you simplify the process of creating and simulating context-aware segmentation policies to minimize business disruption.
    - See eyeSegment in action with a live demo highlighting some of the enterprise-wide network segmentation use cases
  • Move Beyond VPN to Secure your Remote Workforce Recorded: Apr 7 2020 61 mins
    Steve Hunter, Sr. Director Systems Engineering APJ , Forescout Technologies
    We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources. Meanwhile, security teams continue to wrestle with how to ensure security without disrupting the business. To minimize risk, every organization needs complete visibility into the security of remotely connected corporate and BYOD assets.
    Join Forescout to learn how to quickly:

    •Discover all remote devices connecting to your network, including BYOD systems
    •Identify which remotely connected devices meet your security policies, and which don’t
    •Automate policy-based controls to protect your network, even with a remote team
  • Move Beyond VPN to Secure your Remote Workforce Recorded: Apr 2 2020 54 mins
    Jeni Lloyd, Product Marketing; David Wolf, Research; Mitesh Shah, Technical Marketing and Bob Reny, Systems Engineering
    We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources. Meanwhile, security teams continue to wrestle with how to ensure security without disrupting the business. To minimize risk, every organization needs complete visibility into the security of remotely connected corporate and BYOD assets.
    Join Forescout to learn how to quickly:

    •Discover all remote devices connecting to your network, including BYOD systems
    •Identify which remotely connected devices meet your security policies, and which don’t
    •Automate policy-based controls to protect your network, even with a remote team
  • Identify and Act Faster – Forescout 8.2 Accelerates Risk Mitigation. Recorded: Mar 18 2020 38 mins
    Mitesh Shah, Technical Marketing & Minakshi Sehgal, Product Marketing, Forescout Technologies
    Building a complete picture of your device landscape, including all device types, across siloed tools and teams, can be expensive and often impossible to achieve. However, complete situational accuracy of your device landscape is critical to accurately identifying and proactively responding to risk. CIOs, CISOs, network and security teams need a shared understanding of device insights to increase security collaboration.

    Join us to learn how Forescout 8.2 can help you identify and act – faster, by providing actionable device context to pinpoint, prioritize and quickly mitigate risk across campus, data center, cloud and OT networks.

    Session highlights:

    • Demo: Watch firsthand how Forescout 8.2 helps mitigate risk during a global outbreak
    • eyeExtend App Ecosystem: Learn how to build an integrated security strategy by leveraging community-built apps
    • Cloud-first deployments: Gain flexibility and faster time-to-value with AWS and Azure deployment options
  • Accelerate Enterprise-Wide Network Segmentation with eyeSegment Recorded: Dec 11 2019 51 mins
    Sandeep Kumar, Sr. Director of Product Marketing & Abdi Saee, Principal Product Marketing Manager
    Accelerate network segmentation projects while reducing operational complexity and minimizing business disruption.

    Forescout eyeSegment extends the capabilities of the Forescout platform to address segmentation challenges across multiple network domains and multiple enforcement technologies. It enables organizations to embrace zero trust principles for all connected devices, including IoT and OT.

    Join us to learn how Forescout eyeSegment:
    • Accelerates the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk.
    • Simplifies the process of creating context-aware segmentation policies and simulating them prior to enforcement to minimize business disruption.
    • Orchestrates segmentation controls across diverse enforcement technologies and network domains.
  • Zero Trust Security in the Age of IoT and OT Recorded: Dec 3 2019 56 mins
    Sandeep Kumar, Sr. Director of Product Marketing, Forescout Feat. Chase Cunningham, Principal Analyst, Forrester
    In its October 2019 Zero Trust eXtended Ecosystem Wave Report, Forrester calls IoT and OT device security, “one of the hardest problems to solve within the enterprise."* As unmanaged devices become commonplace on networks, security and risk professionals must rethink the concept of identity and expand their Zero Trust initiatives to include such devices.

    Watch this live webinar hosted by Forescout Senior Director of Product Marketing Sandeep Kumar, featuring Chase Cunningham of Forrester Research to learn why it’s essential to:

    • Embrace Zero Trust holistically across all types of users, devices and connected things
    • Expand the concept of identity to include IoT and OT
    • Use a context-based approach to enterprise-wide network segmentation


    *Source: The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
  • How to Put Forrester’s Zero Trust Playbook into Action Recorded: Aug 30 2019 36 mins
    Dr. Chase Cunningham - Forrester Principal Analyst and Steve Hunter, Senior Director, System Engineering APJ
    Join Forescout and hear from Dr Chase Cunningham on the Zero Trust model and steps organisations within the Asia Pacific region can take to ensure successful implementation of the framework.
  • CEO Speaks: Top 5 Risks That CISOs Need to Quantify Recorded: Aug 8 2019 60 mins
    Jack Jones, Chairman of The FAIR Institute & Gaurav Pal, CEO and Founder of stackArmor
    As breaches continue to make headlines, CEOs are now being held personally accountable, often resulting in loss of job and reputation. This accountability extends to both public sector and commercial entities, especially those involved in critical infrastructure. Forescout is pleased to host a frank discussion with two experienced executives in the risk and information security industry who not only run these organizations, but also evangelize the importance of prioritizing risk from third-party and other sources.

    They will provide insight on:
    • Top risks and exposure, especially from the convergence of information technology (IT) and operational technology (OT) infrastructures.
    • How frameworks like NIST RMF and CSF play a role in establishing good risk hygiene.
    • Actionable playbook to consider when creating and presenting a risk plan to the CEO and board.
  • Join us to Learn how to Put Forrester’s Zero Trust Playbook into Action Recorded: Jul 11 2019 34 mins
    Dr. Chase Cunningham - Forrester Principal Analyst and Steve Hunter, Senior Director, System Engineering APJ
    Join Forescout and hear from Dr Chase Cunningham on the Zero Trust model and steps organisations within the Asia Pacific region can take to ensure successful implementation of the framework.
  • Automating Security Controls with Confidence Recorded: Apr 17 2019 52 mins
    Forescout Product Team
    IT security teams are inundated with increasing numbers of security and compliance issues reported by security tools that either lack sufficient device context for prioritization or automation capabilities to enforce risk mitigation controls. As a result, highly skilled security teams waste time manually troubleshooting low-impact issues, unable to focus on proactive risk reduction or rapid threat response.

Join us to learn how Forescout 8.1 enables organizations to orchestrate actions and automate controls while minimizing business disruption. Topics include:

    • Orchestration of segmentation controls across Fortinet®, Palo Alto Networks® and Check Point® firewalls

    • Incident response automation with ServiceNow® ITSM and Security Operations

    • Automation of controls for network access and device compliance initiatives
  • Unified Device Visibility for IT and OT Environments Recorded: Mar 27 2019 39 mins
    Forescout Product Team
    As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems.

Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
    
• Visibility and continuous monitoring of all layers of the OT network stack
    
• Auto-classification of medical, industrial, networking and IoT devices
    
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense Recorded: Dec 11 2018 58 mins
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    • The current threat landscape and unique security challenges healthcare organizations face
    • Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    • How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • 参与我们的讨论,了解如何能构建精准并实时的资产管理数据库。 Recorded: Nov 6 2018 65 mins
    王睿,系统工程师 & 粱大伟,资深系统工程师
    准备好自动化管理和更新您的企业资产管理数据库了么?试想一下无需手动更新,无需EXCEL表格录入就能轻松更新实时终端数据。为了更有效的管理和保护资产安全,您需要了解网络中每一个终端的深度信息,而且掌握实时终端设备的信息变化包括物联网设备。现在几乎所有的资产管理系统都离不开人工操作,所以获得正确的数据和刷新终端设备信息成为了我们最大的挑战。加之几乎所有目前的资产管理系统都无法存放非传统终端例如物联网设备。我们供一个简单的方法。加入我们的讲座,看看我们如何帮助您:
    •自动化 管理所有IP-based设备无论是从IT网络或是OT网络
    •锁定IP设备地点刷新实时数据
    •持续而准确的评估所有IP-based资产设备
    •配准企业CMDB利用完整的终端信息
  • IoT Risk and Posture Assessment Recorded: Jul 11 2018 43 mins
    Len Rosenberg, Vice President Engineering, ForeScout Technologies
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • Raising the Bar on Device Classification Recorded: Jun 27 2018 34 mins
    Steve Hunter, Sr. Director Systems Engineering, ForeScout Technologies
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Visibility for the Extended Enterprise Recorded: Jun 19 2018 38 mins
    Steve Hunter, Sr. Director Systems Engineering, ForeScout Technologies
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • 使用网络安全策略网络分段,阻止恶意软件扩散 Recorded: May 29 2018 84 mins
    Rui Wang, 系统工程师 & David Leung, 资深系统工程师
    一旦恶意软件突破了网络防御边际,就很难阻止它们攻击其他的内网设备,而且他们能潜伏在您的网络中长达数日,数周,甚至是数月。在您的网络中,每一个网络设备都很可能成为潜在的攻击对象。

    我们必须侦查到每个网络终端节点而且实施保护措施,包括每一个受管控的设备到非受管控的系统乃至物联网设备。加入我们五月二十九日的讲座,我们会展示如何最大限度的减少网络相关攻击和漏洞,以及如何保护您的企业免受恶意软件的攻击。

    •使用无代理的完全网络可视性以及细致的设备分类,去定义网络设备的功能角色和区域
    •无需安装代理,强力执行企业的网络安全策略,控制终端行为。
    •利用企业中现有的网络安全设备直接加强可视性和减少修复时间。
Device Visibility & Control across the extended enterprise
The Forescout platform provides organizations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk.

Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Move Beyond VPN to Secure your Remote Workforce
  • Live at: Apr 7 2020 4:00 am
  • Presented by: Steve Hunter, Sr. Director Systems Engineering APJ , Forescout Technologies
  • From:
Your email has been sent.
or close