ForeScout CounterACT Achieves Common Criteria EAL 4+
November 2011 by Emmanuelle Lamandé
ForeScout Technologies, Inc., announced it has achieved the industry’s highest level of security certification for a Network Access Control (NAC) solution involving assurances from the EAL 4+level.
Common Criteria Evaluation Assurance Levels (EAL) offer a simple scale for comparative measurement, enabling technology buyers to verify that products meet the security claims made by vendors. The comprehensive evaluation process attests to ForeScout’s secure development practices.
ForeScout’s award-winning CounterACT platform offers government enterprises real-time visibility and automated control for network access control (NAC), guest networking, mobile security, endpoint compliance and threat prevention. Other capabilities include:
– Integration and assured deployment – integrates enterprise-class NAC, network asset inventory, guest management and endpoint security functionality in one appliance that offers a hybrid approach for 802.1x and non-802.1x access and endpoint compliance; also facilitates federal and military organisations’ efforts to quickly satisfy “comply to connect” mandates
– Real-time, agentless visibility, asset inventory and endpoint control – automates device classification and provides dynamic, accurate and continuous monitoring of endpoint compliance
– Mobile security – delivers the capability to classify, report by brand and by user, and apply custom policies to corporate and personal smartphone and mobile devices without requiring agents
– Rich guest registration – a broad set of guest policies enables the flexibility to tighten, loosen and automatically set the guest registration process, enforcement and post-connect monitoring
– Interoperability and HBSS support – integrates with a variety of network, security, identity and systems management security infrastructure consolidation tools such as those from BMC, HP ArcSight and McAfee for greater situational intelligence and operational control; closes gaps in Host Based Security Systems (HBSS) by providing real-time means to assess and monitor endpoints and readily remediate policy violations and potential threats