Solution Brief Organizational Challenges •Protect the security of intellectual property and other sensitive data •Enhance network security without impeding employees’ ability to improve their productivity •Comply with regulatory mandates pertaining to your company or industry •Facilitate streamlined network access and information sharing for trusted contractors and customers •Gain continuous monitoring and mitigation capabilities that leverage existing investments Technical Challenges •Discover personally owned and rogue devices as well as other endpoints connected to your network in addition to corporateowned devices •Control access to confidential data •Prevent infected or non-compliant devices from spreading malware across the network •Keep targeted attacks from stealing data or forcing network downtime •Measure effectiveness of security controls and demonstrate compliance with regulations Mobile and BYOD Detect, profile and control mobile devices with ForeScout Mobility and Bring Your Own Device (BYOD) are clearly the wave of the future. Few organizations have a choice in the matter, as today’s employees work everywhere and don’t go anywhere without their smartphones, tablets and other personally owned devices. But regardless of who owns the mobile devices accessing your network, every single one is a potential point of entry for hackers and thieves. ForeScout Technologies, Inc. helps IT professionals to secure networks and the devices that employees are using every day. What’s more, ForeScout achieves this efficiently and cost-effectively without slowing down network users or IT administrators. The Challenge Here are a few facts about mobile devices that reinforce the need for comprehensive mobile security solutions: • More than 2,000 unsafe or malicious apps are installed on users’ BYOD devices in the average enterprise.1 •75 percent of mobile applications will fail basic security tests.2 • 5.2 million smartphones were lost or stolen in the U.S. in 2014.3 Traditional Mobile Device Management (MDM) systems alone aren’t capable of deterring today’s sophisticated and relentless attacks on networks. Their only defenses are security policy profiling, application management and data containerization. What’s missing? • MDM systems only see and manage enrolled devices, leaving IT managers blind to personal and unmanaged devices on the network. •Access to applications is controlled, but access to the network is wide open. Thus, compromised devices are free to attack the network, and sensitive data on the network is completely vulnerable. •Traditional profiling is polling-based, so a device is only as benign and compliant as it was during the last check. • Little or no integration: MDM systems generally have their own sets of management screens, policies and reports. This siloing causes policies to be inconsistently applied across IT management systems and groups. As mobile devices proliferate, additional intelligence must be applied in order to eliminate intrusions, protect sensitive information and mitigate exposure to mobile threats. IT security managers need the ability to control where mobile devices are allowed on the network, based on the device type, operating system, owner of the device and user login credentials of the device. Also, they need to be able to secure devices upon network resource request and take the most appropriate violation response, which may include limiting access to Internet-only. Lastly, they need mobile device management—and all network access control monitoring and mechanisms—to work together on a continuous, 24/7 basis. 1 Solution Brief The ForeScout Solution The foundation of CounterACT intelligence and functionality can be summed up in three words: See, Control and Orchestrate. So, how do you manage mobility and BYOD trends in ways that are secure and reliable while staying out of the way of employees, partners and customers? ForeScout CounterACT™ can help you manage myriad devices, not to mention mobility and BYOD trends. It continuously scans the network and monitors the activity of the wide range of devices attempting to access your network, as well as those already logged on. That includes unknown devices such as unmanaged, personally owned devices as well as rogue devices. And unlike systems that simply flag violations and send alerts to IT and security staff, ForeScout CounterACT lets you automate and enforce policy-based network access control, endpoint compliance and mobile device security. The foundation of CounterACT intelligence and functionality can be summed up in three words: See CounterACT offers the unique ability to discover devices the instant they connect to your network, without requiring software agents or previous device knowledge. It profiles and classifies devices, users, applications and operating systems while continuously monitoring managed devices, personally owned devices and other endpoints. Control CounterACT can allow, deny or limit network access based on device posture and security policies. By assessing and remediating malicious or highrisk endpoints, it mitigates the threat of data breaches and malware attacks that would otherwise put your organization at risk. In addition, by continuously monitoring devices on your network and controlling them in accordance with your security policies, CounterACT dramatically streamlines your ability to demonstrate compliance with industry mandates and regulations. Orchestrate CounterACT integrates with more than 70 network, security, mobility and IT management products* via ForeScout ControlFabric™ Architecture. This ability to share real-time security intelligence across systems and enforce a unified network security policy reduces vulnerability windows by automating system-wide threat response. What’s more, it lets you gain higher return on investment from your existing security tools while saving time through workflow automation. Learn more at www.ForeScout.com For enterprises in more than 60 countries*, ForeScout is providing the agentless, scalable and cost-effective solution that meets the highest standards for security, ease of use and deployment, low end-user impact and interoperability with existing MDM systems. Seeing Is Believing ForeScout CounterACT is sold as either a virtual or physical appliance that deploys within your existing network, typically requiring no changes to your network configuration. The CounterACT appliance physically installs out-of-band, avoiding latency or issues related to the potential for network failure. It can be centrally administered to dynamically manage tens or hundreds of thousands of endpoints from one console. ForeScout Technologies, Inc. 900 E. Hamilton Avenue #300 Campbell, CA 95008 USA Toll-Free (US) 1.866.377.8771 Tel (Intl) 1.408.213.3191 Support 1.708.237.6591 Fax 1.408.371.2284 1 Veracode analytical data, March 2015 https://www.veracode.com/average-large-enterprise-has-more-2000-unsafe-mobile-apps-installedemployee-devices 2 Gartner Research, Sept 2014 http://www.scmagazine.com/gartner-75-percent-of-mobile-apps-will-fail-security-tests-through-endof-2015/article/372424/ 3 Consumer Reports National Research Center, June 2015 http://www.consumerreports.org/cro/news/2015/06/smartphone-thefts-on-thedecline/index.html *As of October 2015 Copyright © 2015. All rights reserved. Privacy policy. ForeScout Technologies, Inc. is a privately held Delaware corporation. ForeScout, the ForeScout logo, ControlFabric, CounterACT Edge, ActiveResponse and CounterACT are trademarks or registered trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners. Version 11_15 2
© Copyright 2026 Paperzz