Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique





















Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

ForeScout will demonstrate ControlFabric Interoperability at Infosecurity Europe

June 2015 by Emmanuelle Lamandé

ForeScout Technologies, Inc., announced that it will demonstrate extensive integration capabilities leveraging its ControlFabric™ architecture with four of its key technology partners at the “ControlFabric Interoperability Demo,” which will take place at Infosecurity Europe, from 2-4 June in London.

ForeScout ControlFabric is a set of open integration technologies that enables ForeScout CounterACT™ and other IT solutions to exchange information and efficiently mitigate a wide variety of network, security and operational issues.

ForeScout ControlFabric partners and integrations to be showcased at Infosecurity Europe include:

- Gigamon® – ForeScout and Gigamon work together to enable the availability and efficient monitoring of network traffic to obtain real-time visibility and automated control over users, devices, systems, applications, and vulnerability management (VM) accessing network resources and other sensitive data.

- Intel® Security – ForeScout integrations with McAfee® ePolicy Orchestrator® (ePO®), McAfee Vulnerability Manager (MVM), and McAfee Enterprise Security Manager (ESM) enable organisations to reduce risk associated with unauthorised, vulnerable and non-compliant endpoints. ForeScout CounterACT ensures that ePO agents are installed, running and up-to-date on corporate systems, triggers real-time MVM scans of endpoints when they connect to the corporate network, and provides up to the minute endpoint security posture and context to ESM. Additionally, ForeScout CounterACT leverages the Intel® Security Data Exchange Layer (DXL) to receive threat intelligence from McAfee Threat Intelligence Exchange (TIE), and identify malware and infections on connecting endpoints. Upon detection of advanced threats, CounterACT can take policy-based actions to contain infected endpoints and initiate risk mitigation actions.

- LogRhythm® – ForeScout and LogRhythm enable IT organisations to gain real-time visibility into the risks and threats on their networks, including mobile and BYOD activity. LogRhythm’s security intelligence platform works in conjunction with CounterACT to rapidly identify endpoint security threats and policy violations. LogRhythm’s SmartResponseTM functionality leverages CounterACT to initiate policy-based automated response to quickly mitigate security issues and drive down mean-time-to-resolution.

- Qualys – As the newest potential partner in the ControlFabric ecosystem, an integration between ForeScout CounterACT and Qualys Vulnerability Management will enable IT organisations to improve the timeliness and efficacy of their vulnerability assessments, automate endpoint remediation, and reduce their endpoint attack surface.




See previous articles

    

See next articles