SlideShare a Scribd company logo
1 of 30
Download to read offline
ForeScout Product Overview
 Hanan Levin, VP Products
 November 2012



© 2012 ForeScout Technologies, Page 1   ForeScout Confidential
How I (almost didn’t) Made It To Riga…




© 2012 ForeScout Technologies, Page 2   ForeScout Confidential
How I (almost didn’t) Made It To Riga…




© 2012 ForeScout Technologies, Page 3   ForeScout Confidential
ForeScout Product Solutions

   Off-premise endpoints                                                                      Cloud




  Network access servers


                                                                                         Servers, VMs

  Endpoints




                                    All users          All locations            All devices
                                       Corporate           Cloud                 PCs, BYOD
                                       Home workers        On-site               VMs
                                       Guests              Off-site              Rogue
                                       Contractors                                Off-line

      Accelerate business productivity and connectivity by enabling secure
           corporate resource access to anyone, anywhere, anytime
© 2012 ForeScout Technologies, Page 4                      ForeScout Confidential
CounterACT Appliance Architecture




Console                                 EM                        RM


                         App1            App2                     App3


© 2012 ForeScout Technologies, Page 5    ForeScout Confidential
Device Visibility: How it is Done?

 • Remote-Inspection (RI)
         – Corporate hosts (requires domain credentials)
         – Via WMI or via “Remote Registry Server” service running
         – Run scripts via WMI or via ForeScout service (fsprocsvc)
         – File System Access – Samba


 • SecureConnector
         – Guests users
         – Hosts behind firewall, and behind VoIP port (trigger IP bounce post VLAN change)
         – Where there is no domain


 • Device info (used for classification and compliance)
         – Windows OS, Registry and Files properties
         – AV/P2P/IM/FW
         – Microsoft vulnerabilities
         – Application Installed/Services/Processes/Open ports
         – User and domain information, MAC Address and network Information
         – Script Results




© 2012 ForeScout Technologies, Page 6              ForeScout Confidential
Device Classification: How it is Done?

• Cross devices                                           • Switch Plugin
      – HPS for managed Windows                                    – VoIP devices (CDP)
      – Mac-Linux for managed Macs/Linux
      – MDM (plugins and integration) for managed         • Wireless Plugin
        iOS/Android
                                                                   – User-Agent via SNMP
      – Switch/Wireless plugins for configured
        devices
                                                          • DHCP Plugin
• HPS Plugin                                                       – DHCP Request fingerprint

      – NMAP OS Fingerprint scan
      – NMAP Banners scan


• Packet-Engine
      – Passive fingerprint
      – Browser HTTP User-Agent
      – DHCP traffic




© 2012 ForeScout Technologies, Page 7            ForeScout Confidential
Device Remediation

 • Remediate devices
         – Kill P2P/IM/Processes
         – Fix AV: start and update
         – Run Script
         – Install MS Patches
         – Disable Dual-Homed
         – Block External Devices
         – Set Registry




© 2012 ForeScout Technologies, Page 8   ForeScout Confidential
CounterACT Integration Platform


          SIEM                                 MDM                                 WAP                   VA
• CEF Support                           • Unified visibility             • Detection, OS        •   Real-time scan
• CounterACT                            • Auto-enrollment                     classification    •   Complete scan
  sends endpoint                        • Policy check on                •    Role-based        •   Import VA results
  intelligence                            admission                           assignment        •   CounterACT
• CounterACT                            • Access based on                •    BYOD / guest          remediation and
  assures logging                         security posture               •    Access control        granular
  processes                             • Network resource               •    WLAN quarantine       enforcement
• SIEM triggers                           restriction
  CounterACT
  mitigation,
  isolation and
  blocking




© 2012 ForeScout Technologies, Page 9                     ForeScout Confidential
CounterACT Integration Platform



                                                  NAC Policy Engine


 Windows          Mac,
                                                                              Dir,
 (WSUS,        Linux, iOS,      MDM      Switch    VPN            Wi-Fi                SIEM   VA   Antivirus
  SCCM)          Android                                                    Database




© 2012 ForeScout Technologies, Page 10             ForeScout Confidential
Database / Directory Integration



• Business intelligence via data integration module
     – Inventory and policy driven by extensive information taken from databases and directories
              Track changes in business app data
              Make policy decisions/actions upon business contextual data
     – Push real-time network and endpoint data to business apps
     – Flexible integration using custom queries

Usage examples
     – Validate user profile and rights (Corporate, BYOD, Guest, Contractor)
     – Identify non-managed and non-accounted for devices (by MAC, User, S/N, etc.)




  © 2012 ForeScout Technologies, Page 11       ForeScout Confidential
Introducing CounterACT Version 7




© 2012 ForeScout Technologies, Page 12   ForeScout Confidential
Tactical Map: At-a-Glance Global Overview




                Powered by Google Maps

© 2012 ForeScout Technologies, Page 13   ForeScout Confidential
Tactical Map: Per Site Compliance View




                Drill down to site status information

© 2012 ForeScout Technologies, Page 14     ForeScout Confidential
Tactical Map: Locate, Alert, Mitigate




                Real-time alert, locate and mitigate in seconds

© 2012 ForeScout Technologies, Page 15    ForeScout Confidential
Tactical Map: Your Network Like Never Seen Before

 • A new way to look, and manage, global sites
         – At a glance status of entire global site
         – Draw admin attention to compliance issues
         – Surface alerts



 • Easier to scale
         – Quick track of global distributed site status


 • Easy, one time setup
         – Define locations and assign to segments


 • Customized view
         – Tune alert thresholds
         – Google Maps tools: satellite view, navigation, zoom


 • Executive management tool

© 2012 ForeScout Technologies, Page 16          ForeScout Confidential
Tactical Map: Usage

 1. Track overall compliance level with corporate policies
         – Set compliance thresholds : Compliance policies, Unmanaged hosts, Malicious hosts
         – Identify site not meeting compliance level
         – Drill down to non-compliant hosts
         – Remediate hosts to become compliant

 2. Locate policy results per site
         – Select policy on policy tree
         – Map is filtered per selected policy – only sites with hosts matching the policies shown.
         – Table shows all matching hosts

 3. Search for specific hosts
         – Using search bar, policies and filters selection
         – Sites with hosts matching the search/filter will shown with bigger circles
         – Table shows all matching hosts

 4. Send tactical map to CIO



© 2012 ForeScout Technologies, Page 17          ForeScout Confidential
Real-time Inventory: Hardware




© 2012 ForeScout Technologies, Page 18   ForeScout Confidential
Real-time Inventory: Hardware


 • Collect detailed device hardware information
         – Like serial numbers, CPU types, media devices and more..

 • Usage examples
         – Validate user
           profile and rights
           (Corporate, BYOD,
            Guest, Contractor)
         – Identify
           non-managed and
           non-accounted
           for devices
           (by MAC, User,
           S/N, etc.)
         – Verify valid certificate
                 Identify expired/revoked MS machine based X.509 certificate




© 2012 ForeScout Technologies, Page 19         ForeScout Confidential
Real-Time Inspection

SecureConnector: Polling Mode                          SecureConnector: Event Driven (New)
• Host rechecked depending on policy • No need to poll hosts
       – Admissions                                            – No need for host rechecks
       – Recheck periods                                       – Not depending on admission rechecks
• Limitations                                          • Changes monitored in real-time
       – Changes not reflected in real time                    – SC reports immediately to CounterACT
       – To achieve real time, users tend to                   – CounterACT display real-time picture
         reduce re-check period, resulting with                – More economical SC inspection
                slower CounterACT performance                         Lower bandwidth consumption/footprint
                SC generates extensive traffic                        Higher HPS, CounterACT performance
                                                       • Usage examples
                                                               – User stops Antivirus => Host status
                                                                 changes immediately to „not-compliant‟
                                                               – User starts P2P/IM => Host status
                                                                 changes immediately to „not-compliant‟
                                                               – New process started, application installed
                                                                 => Inventory display updated

 © 2012 ForeScout Technologies, Page 20      ForeScout Confidential
Flexible Containment and Mitigation Options

 • DNS enforcement
         – Enable secure corporate, BYOD and guest access on remote sites with no appliances
         – Redirect connecting users to access portal
         – Extend deployment scenario flexibility (e.g. multiple sites without IT teams)

 • WAP VLAN quarantine
         – SSID VLAN quarantine across WAP vendors using MAB &RADIUS (e.g. Cisco, Aruba)
         – WAP enabled for MAB and set to authenticate against CounterACT built-in RADIUS
         – Brocade WAP integration

 • Dual-homed detection and protection
         – Detect hosts with more than one active network interface, acting as a bridge between
           trusted and untrusted networks
         – Auto disable network adapter (e.g. rogue WiFi connection, LAN network-card, 3G
           adapter)
         – Auto re-enable the adapter once the host is disconnected from the trusted network



© 2012 ForeScout Technologies, Page 21     ForeScout Confidential
ForeScout CounterACT 2012 Summary
 CounterACT 7.0 released Nov 15th, 2012

 • Policy                                                      • Monitor, Mitigation & Containment
         – Business intelligence leverage external                       –   Real-time, event driven inspection
           sources                                                       –   DNS enforcement
         – MDM, SIEM, WAP and VA integration                             –   WAP VLAN quarantine extended
         – Windows machine certificate assurance                         –   Dual-homed detection & protection


 • Baseline                                                    • Guest & Profiling
         – Tactical map                                                  –   BYOD profiling template, out of the box
         – Hardware inventory                                            –   Device registration (BYOD, Contractor PC)
                                                                         –   Sponsor pre-registration of guests
                                                                         –   Limit guest access time period
 • Access Control
         – Best of breed 802.1X: troubleshooting,              • Scalability
           remediation, policy, rollout, plug & play
                                                                         – CT-10,000, VCT-10,000
         – Built-in RADIUS Server                                        – Scaled-up Enterprise Manger
                                                                         – VM Compatibility: VM-tools, MS Hyper-V




© 2012 ForeScout Technologies, Page 22          ForeScout Confidential
ForeScout Mobile
 ForeScout MDM


© 2012 ForeScout Technologies, Page 23   ForeScout Confidential
BYOD: Gap in Corporate Security


                        Employees Bringing Their Own Devices




© 2012 ForeScout Technologies, Page 24   ForeScout Confidential
ForeScout Mobile Security
 Flexible approach for BYOD


• Unifies security policy management
      – Centralized visibility and enforcement
      – All managed and personal devices


• Dual protection
      – Network: real-time visibility, control access, block threats
      – Device: compliance, remote wipe/lock, applications, data


• Choice of functionality
  1. ForeScout CounterACT: basic mobile device visibility and network protection
  2. ForeScout Mobile Security Module: extends visibility & control (iOS / Android)
  3. ForeScout Mobile Integration Module: third party MDM integration
  4. ForeScout MDM: complete, cloud-based enterprise mobile device management




© 2012 ForeScout Technologies, Page 25    ForeScout Confidential
ForeScout Mobile
  Security for Android and iOS

  • CounterACT Mobile plugin
          – Installed on CounterACT
          – Integrated with CounterACT console, policy, inventory and reporting


  • Mobile App
          – Android app (apk) for Android 2.x devices
          – Apple iPhone and iPad
                  – iOS app
                  – Leverages Apple MDM and Live Push technologies


Corp Login             Guest Reg.         Browser Hijack Profile Rec‟d Profile Install   Ready




 © 2012 ForeScout Technologies, Page 26        ForeScout Confidential
ForeScout Mobile

 ForeScout Mobile Security Module                                ForeScout Mobile Integration Module

       – Mobile device inspection                                       –   Fiberlink
       – Corp/BYOD/Guest access control                                 –   SAP/Afaria
       – Mobile Compliance and remediation                              –   MobileIron
       – Device configuration and restrictions                          –   Coming soon
                                                                               AirWatch
       – Support iOS and Android
                                                                               Zenprise
       – iOS jail-broken detection
                                                                               Good
       – Remote wipe/lock/reset password
                                                                               Boxtone
       – Coming soon
                Manage/control off-site mobile devices
                Win Mobile
                Blackberry




© 2012 ForeScout Technologies, Page 27         ForeScout Confidential
ForeScout Mobile: iOS Architecture

         Mobile
          Cloud
         (APNS)                                                        Unsecured
                                                                        Network


                                                                               Guest
                                                                              Network


                                                                           Production
                       BYOD Corp                                            Network
  User connects to unsecured Wifi network
  User hijacked: auth. and classified (AD/RADIUS, DB)
 BYOD/Corp MDM profile set on mobile device
 User allowed access to production network
 Mobile device checked for compliance (via MDM)
 Install mobile apps: notifications, corporate proprietary
© 2012 ForeScout Technologies, Page 28        ForeScout Confidential
ForeScout MDM: Cloud, Device, Network
 Hybrid Cloud and On-Premise Mobile Security



             Apple iOS
             MDM API




   Android
   Agent
                                         ForeScout MDM                    Cloud
                                               Powered by MaaS360       Extenders




      BlackBerry
      Symbian
      Windows
      webOS




          ForeScout MDM Console

                                                 ForeScout CounterACT

© 2012 ForeScout Technologies, Page 29   ForeScout Confidential
Thank You




© 2012 ForeScout Technologies, Page 30   ForeScout Confidential

More Related Content

What's hot

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereForescout Technologies Inc
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? Forescout Technologies Inc
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)cyberlocke
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Zoe Gilbert
 

What's hot (20)

Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 

Similar to DSS ITSEC 2012 ForeScout Technical RIGA

Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmcKhazret Sapenov
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinDroidcon Berlin
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overviewAha Lin
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in noriAlex Popescu
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoideG Innovations
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsRoshan Kulkarni
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinDroidcon Berlin
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 

Similar to DSS ITSEC 2012 ForeScout Technical RIGA (20)

Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Mobile testing
Mobile testingMobile testing
Mobile testing
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmc
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
 
Centerity Solution overview
Centerity Solution overviewCenterity Solution overview
Centerity Solution overview
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
Programatori cu capul in nori
Programatori cu capul in noriProgramatori cu capul in nori
Programatori cu capul in nori
 
Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1Discover Great Reasons to move to ConfigMgr 2012 SP1
Discover Great Reasons to move to ConfigMgr 2012 SP1
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to AvoidChoosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
Choosing a Citrix Monitoring Strategy: Key Capabilities and Pitfalls to Avoid
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 

More from Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

DSS ITSEC 2012 ForeScout Technical RIGA

  • 1. ForeScout Product Overview Hanan Levin, VP Products November 2012 © 2012 ForeScout Technologies, Page 1 ForeScout Confidential
  • 2. How I (almost didn’t) Made It To Riga… © 2012 ForeScout Technologies, Page 2 ForeScout Confidential
  • 3. How I (almost didn’t) Made It To Riga… © 2012 ForeScout Technologies, Page 3 ForeScout Confidential
  • 4. ForeScout Product Solutions Off-premise endpoints Cloud Network access servers Servers, VMs Endpoints All users All locations All devices  Corporate  Cloud  PCs, BYOD  Home workers  On-site  VMs  Guests  Off-site  Rogue  Contractors  Off-line Accelerate business productivity and connectivity by enabling secure corporate resource access to anyone, anywhere, anytime © 2012 ForeScout Technologies, Page 4 ForeScout Confidential
  • 5. CounterACT Appliance Architecture Console EM RM App1 App2 App3 © 2012 ForeScout Technologies, Page 5 ForeScout Confidential
  • 6. Device Visibility: How it is Done? • Remote-Inspection (RI) – Corporate hosts (requires domain credentials) – Via WMI or via “Remote Registry Server” service running – Run scripts via WMI or via ForeScout service (fsprocsvc) – File System Access – Samba • SecureConnector – Guests users – Hosts behind firewall, and behind VoIP port (trigger IP bounce post VLAN change) – Where there is no domain • Device info (used for classification and compliance) – Windows OS, Registry and Files properties – AV/P2P/IM/FW – Microsoft vulnerabilities – Application Installed/Services/Processes/Open ports – User and domain information, MAC Address and network Information – Script Results © 2012 ForeScout Technologies, Page 6 ForeScout Confidential
  • 7. Device Classification: How it is Done? • Cross devices • Switch Plugin – HPS for managed Windows – VoIP devices (CDP) – Mac-Linux for managed Macs/Linux – MDM (plugins and integration) for managed • Wireless Plugin iOS/Android – User-Agent via SNMP – Switch/Wireless plugins for configured devices • DHCP Plugin • HPS Plugin – DHCP Request fingerprint – NMAP OS Fingerprint scan – NMAP Banners scan • Packet-Engine – Passive fingerprint – Browser HTTP User-Agent – DHCP traffic © 2012 ForeScout Technologies, Page 7 ForeScout Confidential
  • 8. Device Remediation • Remediate devices – Kill P2P/IM/Processes – Fix AV: start and update – Run Script – Install MS Patches – Disable Dual-Homed – Block External Devices – Set Registry © 2012 ForeScout Technologies, Page 8 ForeScout Confidential
  • 9. CounterACT Integration Platform SIEM MDM WAP VA • CEF Support • Unified visibility • Detection, OS • Real-time scan • CounterACT • Auto-enrollment classification • Complete scan sends endpoint • Policy check on • Role-based • Import VA results intelligence admission assignment • CounterACT • CounterACT • Access based on • BYOD / guest remediation and assures logging security posture • Access control granular processes • Network resource • WLAN quarantine enforcement • SIEM triggers restriction CounterACT mitigation, isolation and blocking © 2012 ForeScout Technologies, Page 9 ForeScout Confidential
  • 10. CounterACT Integration Platform NAC Policy Engine Windows Mac, Dir, (WSUS, Linux, iOS, MDM Switch VPN Wi-Fi SIEM VA Antivirus SCCM) Android Database © 2012 ForeScout Technologies, Page 10 ForeScout Confidential
  • 11. Database / Directory Integration • Business intelligence via data integration module – Inventory and policy driven by extensive information taken from databases and directories  Track changes in business app data  Make policy decisions/actions upon business contextual data – Push real-time network and endpoint data to business apps – Flexible integration using custom queries Usage examples – Validate user profile and rights (Corporate, BYOD, Guest, Contractor) – Identify non-managed and non-accounted for devices (by MAC, User, S/N, etc.) © 2012 ForeScout Technologies, Page 11 ForeScout Confidential
  • 12. Introducing CounterACT Version 7 © 2012 ForeScout Technologies, Page 12 ForeScout Confidential
  • 13. Tactical Map: At-a-Glance Global Overview Powered by Google Maps © 2012 ForeScout Technologies, Page 13 ForeScout Confidential
  • 14. Tactical Map: Per Site Compliance View Drill down to site status information © 2012 ForeScout Technologies, Page 14 ForeScout Confidential
  • 15. Tactical Map: Locate, Alert, Mitigate Real-time alert, locate and mitigate in seconds © 2012 ForeScout Technologies, Page 15 ForeScout Confidential
  • 16. Tactical Map: Your Network Like Never Seen Before • A new way to look, and manage, global sites – At a glance status of entire global site – Draw admin attention to compliance issues – Surface alerts • Easier to scale – Quick track of global distributed site status • Easy, one time setup – Define locations and assign to segments • Customized view – Tune alert thresholds – Google Maps tools: satellite view, navigation, zoom • Executive management tool © 2012 ForeScout Technologies, Page 16 ForeScout Confidential
  • 17. Tactical Map: Usage 1. Track overall compliance level with corporate policies – Set compliance thresholds : Compliance policies, Unmanaged hosts, Malicious hosts – Identify site not meeting compliance level – Drill down to non-compliant hosts – Remediate hosts to become compliant 2. Locate policy results per site – Select policy on policy tree – Map is filtered per selected policy – only sites with hosts matching the policies shown. – Table shows all matching hosts 3. Search for specific hosts – Using search bar, policies and filters selection – Sites with hosts matching the search/filter will shown with bigger circles – Table shows all matching hosts 4. Send tactical map to CIO © 2012 ForeScout Technologies, Page 17 ForeScout Confidential
  • 18. Real-time Inventory: Hardware © 2012 ForeScout Technologies, Page 18 ForeScout Confidential
  • 19. Real-time Inventory: Hardware • Collect detailed device hardware information – Like serial numbers, CPU types, media devices and more.. • Usage examples – Validate user profile and rights (Corporate, BYOD, Guest, Contractor) – Identify non-managed and non-accounted for devices (by MAC, User, S/N, etc.) – Verify valid certificate Identify expired/revoked MS machine based X.509 certificate © 2012 ForeScout Technologies, Page 19 ForeScout Confidential
  • 20. Real-Time Inspection SecureConnector: Polling Mode SecureConnector: Event Driven (New) • Host rechecked depending on policy • No need to poll hosts – Admissions – No need for host rechecks – Recheck periods – Not depending on admission rechecks • Limitations • Changes monitored in real-time – Changes not reflected in real time – SC reports immediately to CounterACT – To achieve real time, users tend to – CounterACT display real-time picture reduce re-check period, resulting with – More economical SC inspection  slower CounterACT performance  Lower bandwidth consumption/footprint  SC generates extensive traffic  Higher HPS, CounterACT performance • Usage examples – User stops Antivirus => Host status changes immediately to „not-compliant‟ – User starts P2P/IM => Host status changes immediately to „not-compliant‟ – New process started, application installed => Inventory display updated © 2012 ForeScout Technologies, Page 20 ForeScout Confidential
  • 21. Flexible Containment and Mitigation Options • DNS enforcement – Enable secure corporate, BYOD and guest access on remote sites with no appliances – Redirect connecting users to access portal – Extend deployment scenario flexibility (e.g. multiple sites without IT teams) • WAP VLAN quarantine – SSID VLAN quarantine across WAP vendors using MAB &RADIUS (e.g. Cisco, Aruba) – WAP enabled for MAB and set to authenticate against CounterACT built-in RADIUS – Brocade WAP integration • Dual-homed detection and protection – Detect hosts with more than one active network interface, acting as a bridge between trusted and untrusted networks – Auto disable network adapter (e.g. rogue WiFi connection, LAN network-card, 3G adapter) – Auto re-enable the adapter once the host is disconnected from the trusted network © 2012 ForeScout Technologies, Page 21 ForeScout Confidential
  • 22. ForeScout CounterACT 2012 Summary CounterACT 7.0 released Nov 15th, 2012 • Policy • Monitor, Mitigation & Containment – Business intelligence leverage external – Real-time, event driven inspection sources – DNS enforcement – MDM, SIEM, WAP and VA integration – WAP VLAN quarantine extended – Windows machine certificate assurance – Dual-homed detection & protection • Baseline • Guest & Profiling – Tactical map – BYOD profiling template, out of the box – Hardware inventory – Device registration (BYOD, Contractor PC) – Sponsor pre-registration of guests – Limit guest access time period • Access Control – Best of breed 802.1X: troubleshooting, • Scalability remediation, policy, rollout, plug & play – CT-10,000, VCT-10,000 – Built-in RADIUS Server – Scaled-up Enterprise Manger – VM Compatibility: VM-tools, MS Hyper-V © 2012 ForeScout Technologies, Page 22 ForeScout Confidential
  • 23. ForeScout Mobile ForeScout MDM © 2012 ForeScout Technologies, Page 23 ForeScout Confidential
  • 24. BYOD: Gap in Corporate Security Employees Bringing Their Own Devices © 2012 ForeScout Technologies, Page 24 ForeScout Confidential
  • 25. ForeScout Mobile Security Flexible approach for BYOD • Unifies security policy management – Centralized visibility and enforcement – All managed and personal devices • Dual protection – Network: real-time visibility, control access, block threats – Device: compliance, remote wipe/lock, applications, data • Choice of functionality 1. ForeScout CounterACT: basic mobile device visibility and network protection 2. ForeScout Mobile Security Module: extends visibility & control (iOS / Android) 3. ForeScout Mobile Integration Module: third party MDM integration 4. ForeScout MDM: complete, cloud-based enterprise mobile device management © 2012 ForeScout Technologies, Page 25 ForeScout Confidential
  • 26. ForeScout Mobile Security for Android and iOS • CounterACT Mobile plugin – Installed on CounterACT – Integrated with CounterACT console, policy, inventory and reporting • Mobile App – Android app (apk) for Android 2.x devices – Apple iPhone and iPad – iOS app – Leverages Apple MDM and Live Push technologies Corp Login Guest Reg. Browser Hijack Profile Rec‟d Profile Install Ready © 2012 ForeScout Technologies, Page 26 ForeScout Confidential
  • 27. ForeScout Mobile ForeScout Mobile Security Module ForeScout Mobile Integration Module – Mobile device inspection – Fiberlink – Corp/BYOD/Guest access control – SAP/Afaria – Mobile Compliance and remediation – MobileIron – Device configuration and restrictions – Coming soon  AirWatch – Support iOS and Android  Zenprise – iOS jail-broken detection  Good – Remote wipe/lock/reset password  Boxtone – Coming soon  Manage/control off-site mobile devices  Win Mobile  Blackberry © 2012 ForeScout Technologies, Page 27 ForeScout Confidential
  • 28. ForeScout Mobile: iOS Architecture Mobile Cloud (APNS) Unsecured Network Guest Network Production BYOD Corp Network User connects to unsecured Wifi network User hijacked: auth. and classified (AD/RADIUS, DB) BYOD/Corp MDM profile set on mobile device User allowed access to production network Mobile device checked for compliance (via MDM) Install mobile apps: notifications, corporate proprietary © 2012 ForeScout Technologies, Page 28 ForeScout Confidential
  • 29. ForeScout MDM: Cloud, Device, Network Hybrid Cloud and On-Premise Mobile Security Apple iOS MDM API Android Agent ForeScout MDM Cloud Powered by MaaS360 Extenders BlackBerry Symbian Windows webOS ForeScout MDM Console ForeScout CounterACT © 2012 ForeScout Technologies, Page 29 ForeScout Confidential
  • 30. Thank You © 2012 ForeScout Technologies, Page 30 ForeScout Confidential