forescout company overview
DESCRIPTION
ForeScout Company OverviewTRANSCRIPT
-
Company Overview
1
ForeScout Technologies is a leading provider of continuous monitoring and mitigation solutions for Global 2000 enterprises and government organizations. With ForeScout, organizations can accelerate productivity by enabling people to access corporate network resources where, how and when needed without compromising security. Our platform fortifies enterprise defenses and mobility while improving IT effectiveness and return on investment in other security tools.
The companys CounterACT appliance and software modules provide the ability to dynamically discover, assess, prevent and resolve security exposures, such as: unknown and unwanted users; devices and applications; unmanaged and unsecure systems; policy violations; and malicious behavior. Our ControlFabric technology provides bi-directional interoperability between CounterACT and a broad range of IT security products and management systems to share intelligence and more efficiently mitigate a wide variety of network, security and operational issues.
ForeScouts solutions are known to be easy to deploy, flexible and scalable. As a result, ForeScout solutions have been chosen by more than 1,800 enterprises and government agencies worldwide.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enterprise IT Security Challenges One challenge for todays enterprise is how to provide greater network accessibility while enforcing security standards. Attempting to maintain security policies for various types of devices (known and unknown, managed and BYOD, PC and mobile, etc.) and different types of users (employees, guests, contractors) connecting through numerous access mechanisms (wired, wireless, VPN) can be very difficult without more automated intelligence and management.
Another challenge is how to make better use of traditional IT security systems given todays dynamic and complex network and an evolving threat landscape. Traditional IT controls are based on the reliance on endpoint security software, periodic vulnerability scans, and multitude of security products. This defense-in-depth model is a best practice, but results in a huge amount of data and often-isolated controls. When viewed as a whole, this conventional approach exhibits a number of problems such as:
1. Inadequate visibility and control over endpoints on the network, especially BYOD devices2. Lack of real-time monitoring and continuous diagnostics 3. Lack of sharing of information between security products, diminishing control context 4. Lack of automation to respond quickly to exposures and to contain advanced threats
ForeScouts AnswerForeScout provides solutions to both of the problems listed above. Our ForeScout CounterACT platform allows IT security managers to see, monitor, and control various things on their network devices, operating systems, applications and users. Armed with this intelligence, CounterACT lets the organization automatically phase-in and enforce both network and endpoint security policies.
ForeScout CounterACT is easy to deploy, use and extend. Everything is contained within an appliance that operates with or without agents and seamlessly integrates into an existing IT environment. Multiple appliances can be centrally managed to support hundreds of thousands of devices from a single console. A policy wizard streamlines administration with a built-in, extensible knowledge base of device classifications, rules and reports to accelerate time-to-value.
Our ForeScout ControlFabric architecture helps solve the second set of problems listed above. ControlFabric is technology that enables CounterACT and other IT solutions to exchange information, gain greater operational context and automate actions. ForeScouts ControlFabric partner ecosystem supports an array of popular network and security products. As a result, IT security managers can achieve continuous monitoring and mitigation capabilities that better leverage their existing investments, optimize their IT resources, and enhance their overall security posture.
Corporate SnapshotIndustry
Enterprise Security Infrastructure
Solution
Continuous Monitoring and Mitigation
Customers
As of January 1, 2015, more than 1,800 enterprise deployments in 62 countries
Markets
Financial services, federal government and defense, healthcare, manufacturing, education, retail, legal, entertainment and service providers
Founded
2000
Employees
300+
CEO
Mike DeCesare
Key investors
Accel Partners, Amadeus Capital Partners, Meritech Capital Partners and Pitango Venture Capital
-
2Company Overview
2015. ForeScout Technologies, Inc. is a privately held Delaware corporation. ForeScout, the ForeScout logo, ControlFabric, CounterACT Edge, ActiveResponse and CounterACT are trademarks or registered trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners.
ForeScout Technologies, Inc.900 E. Hamilton Ave., Suite 300 Campbell, CA 95008 U.S.A.
Contact UsT 1-866-377-8771 (US)T 1-408-213-3191 (Intl.)F 1-408-371-2284 (Intl.)www.forescout.com
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Names
ForeScout CounterACT ForeScout CounterACT Edge
ForeScout Integration Modules ForeScout MDM Enterprise
Delivery
Physical and virtual appliance, service platform and cloud
Integrated Solutions
Network access control, mobile security/BYOD, endpoint compliance and threat management
Features & Benefits
Open, standards-based interfaces enable ForeScout CounterACT and other IT security products to exchange information and automatically resolve a wide variety of IT security issues.
Agentless. CounterACT does not require agents, which means it can be deployed quickly and works with all types of endpoints managed and unmanaged, known and unknown, embedded and virtual, authorized and rogue. No client installation is required.
Guest management. CounterACT allows guests to enroll and access your network according your security standards. Full discovery, authorization and policy-based control minimizes administrative overhead.
Visibility. ForeScout CounterACT provides real-time, multi-dimensional network visibility, allowing you to track users, applications, processes, ports, external devices and more.
Extensive mobile device control. CounterACT detects and manages hand-held mobile devices connected to your Wi-Fi network via automated enrollment, network-based control and MDM interoperability.
Seamless. CounterACT is an out-of-band, passive monitoring appliance which negates network rearchitecting and single point of failure risks.
Non-disruptive. Unlike other NAC products that employ heavy-handed controls and disrupt users, ForeScout CounterACT provides a full spectrum of enforcement options that let you tailor the response to the situation.
Scalability. A range of CounterACT appliance models are available to accommodate local and vastly distributed networks of all sizes. A CounterACT Enterprise Manager allows for multiple appliances to be centrally managed.
IT infrastructure integration. CounterACT supports an extensive range of third-party networking and security hardware and software such as network switches, wireless access points, VPN, antivirus, patch management, ticketing, SIEM, vulnerability assessment and mobile device management (MDM).
Extensibility. Advanced integrations, which are developed and supported by ForeScout, are available as separately licensed modules that can be added to the CounterACT appliance. In addition, ForeScouts Open Integration Module allows customers and partners to easily create custom integrations based on common, standards-based protocols.
Recent Distinctions Positioned as a leader in Gartner Magic Quadrant for Network Access Control 2011, 2012, 2013, and 2014
Ranked as top performer in both product strategy and execution by Forrester
Earned Frost & Sullivan Global Technology Innovation Award 2014
Achieved Common Criteria EAL L4+, the highest level of Security Certification for Network Access Control
Secure Computing Magazine 2012 NAC Reader Choice Award; 2013 5-Star Review and NAC Group Test Best Buy
The Tolly Group Certified 2012
Red Herring 2012 Global Top 100 Startup
Worldwide OfficesHeadquarters: 900 East Hamilton Ave. Campbell, CA 95008 +1-408-213-3191
EMEA: London +44-1256-843633
Israel: Tel Aviv +972-3-6449987
APAC: Hong Kong +852-2411-4388
Doc: 2013.0074 REV. 2