cdm….where do you start? (oa cyber summit)

7
Ellen Sundra, CISSP Senior Federal Systems Engineer, ForeScout ForeScout in Conjunction with 4K Solutions

Upload: open-analytics

Post on 14-Jul-2015

521 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: CDM….Where do you start? (OA Cyber Summit)

Ellen Sundra, CISSP

Senior Federal Systems Engineer, ForeScout

ForeScout in Conjunction with 4K Solutions

Page 2: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 2

VISIBLE NOT VISIBLE

Corporate Resources

NetworkDevices

Endpoints

Applications

Users

Antivirus out of date

Unauthorized application

Agents not installed or not running

Non-corporate

Page 3: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 3

Control Access Based on Compliance

Incident ResponseCompliance Dashboard

CompleteVisibility

Enforcement Remediation

Information Sharing

Endpoint Interrogation & Authentication

Device Discovery, Profiling [HW/SW USER LOC ...]

Multi-factor, Complete,Clientless, Access Control

Continuous

Monitoring

Challenge• Asset visibility

• Access and threat dynamics

• Endpoint and infrastructure diversity

• Network authentication and control

• Dynamic threats and remediation costs

Solution• Pre-admission user/device

authentication and authorization

• Continuous endpoint diagnostics, posture assessment and mitigation

• Port-based control and broad device policy enforcement

• Infrastructure agnostic, interoperable, scalable, works with enterprise tool sets Natively or Using Existing

Enterprise Tools

Page 4: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 4

OpenPlatform

MDM

SIEM

Vulnerability

Assessment

Endpoint Protection

EndpointsNetwork

Infrastructure

AdvancedThreatDetection

Identity

Page 5: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 5

Deployment Timeline

Change Control Boards can study the water and take a stair-step approach

to implementing change

Enforcement is Limited to a Small Number of Policy

Violators Level of Non- Compliance

Control Network Access at Anytime

Page 6: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 6

Questions?

Thank you!

Page 7: CDM….Where do you start? (OA Cyber Summit)

© 2014 ForeScout Technologies, Page 6

Questions?

Thank you!