Submit Search
Upload
DSS ITSEC 2012 ForeScout Technical RIGA
•
0 likes
•
1,973 views
Andris Soroka
Follow
Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 30
Download now
Download to read offline
Recommended
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
NAC Solution Taarak
NAC Solution Taarak
Mohit8780
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Andris Soroka
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
Nac market
Nac market
Sumit Bhat
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
Incheon Park
Recommended
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
NAC Solution Taarak
NAC Solution Taarak
Mohit8780
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Andris Soroka
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
Nac market
Nac market
Sumit Bhat
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
Incheon Park
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
Protect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
Ivanti
Ivanti remote worker ds
Ivanti remote worker ds
Ivanti
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Forescout Technologies Inc
Presentacion nac
Presentacion nac
Adriana Cardona
The how and why of patch management by N-able
The how and why of patch management by N-able
Solarwinds N-able
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
Forescout Technologies Inc
Top Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Forescout Technologies Inc
Network access control (nac)
Network access control (nac)
cyberlocke
What is NAC
What is NAC
Israel Marcus
Endpoint Security
Endpoint Security
Ahmed Hashem El Fiky
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
What is micro segmentation?
What is micro segmentation?
Mir Mustafa Ali
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
Review of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
Check Point NGFW
Check Point NGFW
Group of company MUK
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
SolarWinds
Mobile testing
Mobile testing
Sathyan Sethumadhavan
More Related Content
What's hot
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
Protect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
Ivanti
Ivanti remote worker ds
Ivanti remote worker ds
Ivanti
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Forescout Technologies Inc
Presentacion nac
Presentacion nac
Adriana Cardona
The how and why of patch management by N-able
The how and why of patch management by N-able
Solarwinds N-able
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
Forescout Technologies Inc
Top Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Forescout Technologies Inc
Network access control (nac)
Network access control (nac)
cyberlocke
What is NAC
What is NAC
Israel Marcus
Endpoint Security
Endpoint Security
Ahmed Hashem El Fiky
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
What is micro segmentation?
What is micro segmentation?
Mir Mustafa Ali
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
Review of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
Check Point NGFW
Check Point NGFW
Group of company MUK
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert
What's hot
(20)
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
Protect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
Ivanti remote worker ds
Ivanti remote worker ds
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Presentacion nac
Presentacion nac
The how and why of patch management by N-able
The how and why of patch management by N-able
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
Top Tactics For Endpoint Security
Top Tactics For Endpoint Security
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Network access control (nac)
Network access control (nac)
What is NAC
What is NAC
Endpoint Security
Endpoint Security
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
What is micro segmentation?
What is micro segmentation?
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Review of network diagram
Review of network diagram
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Check Point NGFW
Check Point NGFW
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Similar to DSS ITSEC 2012 ForeScout Technical RIGA
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
SolarWinds
Mobile testing
Mobile testing
Sathyan Sethumadhavan
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmc
Khazret Sapenov
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
Jay Bryant
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Digicomp Academy AG
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
Droidcon Berlin
Centerity Solution overview
Centerity Solution overview
Aha Lin
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
Guy Vinograd ☁
Programatori cu capul in nori
Programatori cu capul in nori
Alex Popescu
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
Microsoft TechNet - Belgium and Luxembourg
Kura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
eG Innovations
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
Eurotech
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Aruba, a Hewlett Packard Enterprise company
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
Aruba, a Hewlett Packard Enterprise company
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Droidcon Berlin
Presentation network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
solarisyourep
Similar to DSS ITSEC 2012 ForeScout Technical RIGA
(20)
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Mobile testing
Mobile testing
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmc
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
Centerity Solution overview
Centerity Solution overview
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
Programatori cu capul in nori
Programatori cu capul in nori
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
Kura M2M IoT Gateway
Kura M2M IoT Gateway
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Presentation network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
More from Andris Soroka
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Andris Soroka
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Andris Soroka
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Andris Soroka
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Andris Soroka
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Andris Soroka
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Andris Soroka
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Andris Soroka
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Andris Soroka
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Andris Soroka
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Andris Soroka
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Andris Soroka
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Andris Soroka
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Andris Soroka
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Andris Soroka
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Andris Soroka
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Andris Soroka
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Andris Soroka
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Andris Soroka
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Andris Soroka
More from Andris Soroka
(20)
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Recently uploaded
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Recently uploaded
(20)
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
DSS ITSEC 2012 ForeScout Technical RIGA
1.
ForeScout Product Overview
Hanan Levin, VP Products November 2012 © 2012 ForeScout Technologies, Page 1 ForeScout Confidential
2.
How I (almost
didn’t) Made It To Riga… © 2012 ForeScout Technologies, Page 2 ForeScout Confidential
3.
How I (almost
didn’t) Made It To Riga… © 2012 ForeScout Technologies, Page 3 ForeScout Confidential
4.
ForeScout Product Solutions
Off-premise endpoints Cloud Network access servers Servers, VMs Endpoints All users All locations All devices Corporate Cloud PCs, BYOD Home workers On-site VMs Guests Off-site Rogue Contractors Off-line Accelerate business productivity and connectivity by enabling secure corporate resource access to anyone, anywhere, anytime © 2012 ForeScout Technologies, Page 4 ForeScout Confidential
5.
CounterACT Appliance Architecture Console
EM RM App1 App2 App3 © 2012 ForeScout Technologies, Page 5 ForeScout Confidential
6.
Device Visibility: How
it is Done? • Remote-Inspection (RI) – Corporate hosts (requires domain credentials) – Via WMI or via “Remote Registry Server” service running – Run scripts via WMI or via ForeScout service (fsprocsvc) – File System Access – Samba • SecureConnector – Guests users – Hosts behind firewall, and behind VoIP port (trigger IP bounce post VLAN change) – Where there is no domain • Device info (used for classification and compliance) – Windows OS, Registry and Files properties – AV/P2P/IM/FW – Microsoft vulnerabilities – Application Installed/Services/Processes/Open ports – User and domain information, MAC Address and network Information – Script Results © 2012 ForeScout Technologies, Page 6 ForeScout Confidential
7.
Device Classification: How
it is Done? • Cross devices • Switch Plugin – HPS for managed Windows – VoIP devices (CDP) – Mac-Linux for managed Macs/Linux – MDM (plugins and integration) for managed • Wireless Plugin iOS/Android – User-Agent via SNMP – Switch/Wireless plugins for configured devices • DHCP Plugin • HPS Plugin – DHCP Request fingerprint – NMAP OS Fingerprint scan – NMAP Banners scan • Packet-Engine – Passive fingerprint – Browser HTTP User-Agent – DHCP traffic © 2012 ForeScout Technologies, Page 7 ForeScout Confidential
8.
Device Remediation •
Remediate devices – Kill P2P/IM/Processes – Fix AV: start and update – Run Script – Install MS Patches – Disable Dual-Homed – Block External Devices – Set Registry © 2012 ForeScout Technologies, Page 8 ForeScout Confidential
9.
CounterACT Integration Platform
SIEM MDM WAP VA • CEF Support • Unified visibility • Detection, OS • Real-time scan • CounterACT • Auto-enrollment classification • Complete scan sends endpoint • Policy check on • Role-based • Import VA results intelligence admission assignment • CounterACT • CounterACT • Access based on • BYOD / guest remediation and assures logging security posture • Access control granular processes • Network resource • WLAN quarantine enforcement • SIEM triggers restriction CounterACT mitigation, isolation and blocking © 2012 ForeScout Technologies, Page 9 ForeScout Confidential
10.
CounterACT Integration Platform
NAC Policy Engine Windows Mac, Dir, (WSUS, Linux, iOS, MDM Switch VPN Wi-Fi SIEM VA Antivirus SCCM) Android Database © 2012 ForeScout Technologies, Page 10 ForeScout Confidential
11.
Database / Directory
Integration • Business intelligence via data integration module – Inventory and policy driven by extensive information taken from databases and directories Track changes in business app data Make policy decisions/actions upon business contextual data – Push real-time network and endpoint data to business apps – Flexible integration using custom queries Usage examples – Validate user profile and rights (Corporate, BYOD, Guest, Contractor) – Identify non-managed and non-accounted for devices (by MAC, User, S/N, etc.) © 2012 ForeScout Technologies, Page 11 ForeScout Confidential
12.
Introducing CounterACT Version
7 © 2012 ForeScout Technologies, Page 12 ForeScout Confidential
13.
Tactical Map: At-a-Glance
Global Overview Powered by Google Maps © 2012 ForeScout Technologies, Page 13 ForeScout Confidential
14.
Tactical Map: Per
Site Compliance View Drill down to site status information © 2012 ForeScout Technologies, Page 14 ForeScout Confidential
15.
Tactical Map: Locate,
Alert, Mitigate Real-time alert, locate and mitigate in seconds © 2012 ForeScout Technologies, Page 15 ForeScout Confidential
16.
Tactical Map: Your
Network Like Never Seen Before • A new way to look, and manage, global sites – At a glance status of entire global site – Draw admin attention to compliance issues – Surface alerts • Easier to scale – Quick track of global distributed site status • Easy, one time setup – Define locations and assign to segments • Customized view – Tune alert thresholds – Google Maps tools: satellite view, navigation, zoom • Executive management tool © 2012 ForeScout Technologies, Page 16 ForeScout Confidential
17.
Tactical Map: Usage
1. Track overall compliance level with corporate policies – Set compliance thresholds : Compliance policies, Unmanaged hosts, Malicious hosts – Identify site not meeting compliance level – Drill down to non-compliant hosts – Remediate hosts to become compliant 2. Locate policy results per site – Select policy on policy tree – Map is filtered per selected policy – only sites with hosts matching the policies shown. – Table shows all matching hosts 3. Search for specific hosts – Using search bar, policies and filters selection – Sites with hosts matching the search/filter will shown with bigger circles – Table shows all matching hosts 4. Send tactical map to CIO © 2012 ForeScout Technologies, Page 17 ForeScout Confidential
18.
Real-time Inventory: Hardware ©
2012 ForeScout Technologies, Page 18 ForeScout Confidential
19.
Real-time Inventory: Hardware
• Collect detailed device hardware information – Like serial numbers, CPU types, media devices and more.. • Usage examples – Validate user profile and rights (Corporate, BYOD, Guest, Contractor) – Identify non-managed and non-accounted for devices (by MAC, User, S/N, etc.) – Verify valid certificate Identify expired/revoked MS machine based X.509 certificate © 2012 ForeScout Technologies, Page 19 ForeScout Confidential
20.
Real-Time Inspection SecureConnector: Polling
Mode SecureConnector: Event Driven (New) • Host rechecked depending on policy • No need to poll hosts – Admissions – No need for host rechecks – Recheck periods – Not depending on admission rechecks • Limitations • Changes monitored in real-time – Changes not reflected in real time – SC reports immediately to CounterACT – To achieve real time, users tend to – CounterACT display real-time picture reduce re-check period, resulting with – More economical SC inspection slower CounterACT performance Lower bandwidth consumption/footprint SC generates extensive traffic Higher HPS, CounterACT performance • Usage examples – User stops Antivirus => Host status changes immediately to „not-compliant‟ – User starts P2P/IM => Host status changes immediately to „not-compliant‟ – New process started, application installed => Inventory display updated © 2012 ForeScout Technologies, Page 20 ForeScout Confidential
21.
Flexible Containment and
Mitigation Options • DNS enforcement – Enable secure corporate, BYOD and guest access on remote sites with no appliances – Redirect connecting users to access portal – Extend deployment scenario flexibility (e.g. multiple sites without IT teams) • WAP VLAN quarantine – SSID VLAN quarantine across WAP vendors using MAB &RADIUS (e.g. Cisco, Aruba) – WAP enabled for MAB and set to authenticate against CounterACT built-in RADIUS – Brocade WAP integration • Dual-homed detection and protection – Detect hosts with more than one active network interface, acting as a bridge between trusted and untrusted networks – Auto disable network adapter (e.g. rogue WiFi connection, LAN network-card, 3G adapter) – Auto re-enable the adapter once the host is disconnected from the trusted network © 2012 ForeScout Technologies, Page 21 ForeScout Confidential
22.
ForeScout CounterACT 2012
Summary CounterACT 7.0 released Nov 15th, 2012 • Policy • Monitor, Mitigation & Containment – Business intelligence leverage external – Real-time, event driven inspection sources – DNS enforcement – MDM, SIEM, WAP and VA integration – WAP VLAN quarantine extended – Windows machine certificate assurance – Dual-homed detection & protection • Baseline • Guest & Profiling – Tactical map – BYOD profiling template, out of the box – Hardware inventory – Device registration (BYOD, Contractor PC) – Sponsor pre-registration of guests – Limit guest access time period • Access Control – Best of breed 802.1X: troubleshooting, • Scalability remediation, policy, rollout, plug & play – CT-10,000, VCT-10,000 – Built-in RADIUS Server – Scaled-up Enterprise Manger – VM Compatibility: VM-tools, MS Hyper-V © 2012 ForeScout Technologies, Page 22 ForeScout Confidential
23.
ForeScout Mobile ForeScout
MDM © 2012 ForeScout Technologies, Page 23 ForeScout Confidential
24.
BYOD: Gap in
Corporate Security Employees Bringing Their Own Devices © 2012 ForeScout Technologies, Page 24 ForeScout Confidential
25.
ForeScout Mobile Security
Flexible approach for BYOD • Unifies security policy management – Centralized visibility and enforcement – All managed and personal devices • Dual protection – Network: real-time visibility, control access, block threats – Device: compliance, remote wipe/lock, applications, data • Choice of functionality 1. ForeScout CounterACT: basic mobile device visibility and network protection 2. ForeScout Mobile Security Module: extends visibility & control (iOS / Android) 3. ForeScout Mobile Integration Module: third party MDM integration 4. ForeScout MDM: complete, cloud-based enterprise mobile device management © 2012 ForeScout Technologies, Page 25 ForeScout Confidential
26.
ForeScout Mobile
Security for Android and iOS • CounterACT Mobile plugin – Installed on CounterACT – Integrated with CounterACT console, policy, inventory and reporting • Mobile App – Android app (apk) for Android 2.x devices – Apple iPhone and iPad – iOS app – Leverages Apple MDM and Live Push technologies Corp Login Guest Reg. Browser Hijack Profile Rec‟d Profile Install Ready © 2012 ForeScout Technologies, Page 26 ForeScout Confidential
27.
ForeScout Mobile ForeScout
Mobile Security Module ForeScout Mobile Integration Module – Mobile device inspection – Fiberlink – Corp/BYOD/Guest access control – SAP/Afaria – Mobile Compliance and remediation – MobileIron – Device configuration and restrictions – Coming soon AirWatch – Support iOS and Android Zenprise – iOS jail-broken detection Good – Remote wipe/lock/reset password Boxtone – Coming soon Manage/control off-site mobile devices Win Mobile Blackberry © 2012 ForeScout Technologies, Page 27 ForeScout Confidential
28.
ForeScout Mobile: iOS
Architecture Mobile Cloud (APNS) Unsecured Network Guest Network Production BYOD Corp Network User connects to unsecured Wifi network User hijacked: auth. and classified (AD/RADIUS, DB) BYOD/Corp MDM profile set on mobile device User allowed access to production network Mobile device checked for compliance (via MDM) Install mobile apps: notifications, corporate proprietary © 2012 ForeScout Technologies, Page 28 ForeScout Confidential
29.
ForeScout MDM: Cloud,
Device, Network Hybrid Cloud and On-Premise Mobile Security Apple iOS MDM API Android Agent ForeScout MDM Cloud Powered by MaaS360 Extenders BlackBerry Symbian Windows webOS ForeScout MDM Console ForeScout CounterACT © 2012 ForeScout Technologies, Page 29 ForeScout Confidential
30.
Thank You © 2012
ForeScout Technologies, Page 30 ForeScout Confidential
Download now