gears + counteract · assess device posture with deep host checking vs. security baseline detect...

25
GEARS + CounterACT Advanced Compliance Enforcement for Healthcare Presented by: Adam Winn Kevin Mayer GEARS Product Manager Product Manager OPSWAT ForeScout December 16, 2014

Upload: others

Post on 10-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTAdvanced Compliance Enforcement for Healthcare

Presented by:

Adam Winn Kevin Mayer

GEARS Product Manager Product Manager

OPSWAT ForeScout

December 16, 2014

Page 2: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTAgenda

Challenges for the healthcare industry

GEARS + CounterACT Partnership

Introducing OPSWAT and the GEARS Platform

Introducing ForeScout and CounterACT

Demo

Q&A

Page 3: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Employees have access to an increasing amount of data within an organization

BYOD gaining in popularity. Risks are tremendous

There is an increase in malware targeting endpoints as an entry point into a network

Organizations need to meet compliance with HIPAA regulations: reliably, affordably, easily, securely

GEARS + CounterACTHealthcare industry needs

Page 4: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Why use GEARS and CounterACT?

Advanced compliance enforcement, especially for HIPAA

Check for disk encryption, password protection, antivirus and more

Smooth on-boarding, flexible and powerful remediation options

Unmatched threat detection for managed and guest endpoints (including pre-authentication)

Force non-compliant devices into remediation states, or even a secure workspace

GEARS + CounterACTThe solution

Page 5: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Founded in 2002

Headquartered in San Francisco

130+ Employees

Customer base 50 OEM customers

800+ direct customers

Product portfolio OESIS

Metascan® and Metascan Online

GEARS

Policy Patrol (Red Earth Software)

GEARS + CounterACTAbout OPSWAT

Page 6: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Advanced endpoint compliance inspection and management

Lightweight agent for Windows and Mac

Cloud-hosted service and management interface

Optional app with tools for end-users

Designed for easy integration

NAC

SSL VPN

IPsec VPN

NGFW

SaaS

GEARS + CounterACTIntroducing GEARS

Page 7: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Monitor endpoint status

Assess device posture with deep host checking vs. security baseline

Detect compromised or vulnerable devices: On the network or remote

Inform end-users about security and the state of their device

Protect resources via integration with secure access solutions

GEARS + CounterACTIntroducing GEARS

Page 8: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Detect and enforce HIPAA Security Standards: Technical Safeguards for PCs*

User authentication §164.312(a)(2)(i)

Automatic device lock-out §164.312(a)(2)(iii)

Disk and data encryption §164.312(a)(2)(iv)

Audit controls §164.312(b)

*All Windows and Mac devices. Mobile and Linux coming in 2015

GEARS + CounterACTHIPAA Compliant with GEARS

Page 9: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTSingle pane of glass

Page 10: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTSimple but powerful configurations

11 Configurable Compliance Categories

Antiphishing

Anti-malware

Backup

Disk Encryption

Firewall

3rd Party Patch Mgmt.

P2P File Sharing

OS Updates

User Authentication

Hard drive space

Infections

Page 11: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Expand and double-check your current malware detection

Take advantage of 42+ anti-malware engines hosted in the cloud

Identify threats not detected or remediated by the installed antivirus

GEARS + CounterACTInfection Detection: Metascan Online

Page 12: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTInfection Detection: AV Log Inspection

Assess guest device risk via 7-day history

Highlight repeated threats (persistent infections)

Page 13: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Best-in-class encryption detection on Windows and Macintosh

Detect disk encryption state, encryption algorithm, and key length for 17+ applications

Detect true encryption state for every volume on the device: Full, partial, in progress, paused, none

Approve only certain encryption brands, products, &/or versions

Generic disk and file encryption option {patent pending}

GEARS + CounterACTGEARS for HIPAA Compliance

Page 14: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTGEARS for HIPAA Compliance

Enhanced antivirus compliance on managed and guest PCs

Allow only your approved antivirus products

Don’t get burned by allowing devices with sub-par antivirus

Require definitions be up to date (< 72 hours)

Require real-time protection be enabled

Require full system scan within the last 7 days

Page 15: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTGEARS for HIPAA Compliance

User-authentication and automatic log out

Require properly configured device password

Require device auto-locks after N minutes

Works for devices on the domain, on a workgroup, even remote

Page 16: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Limit exposure and exfiltration risk with Session Shield

Enforce secure workspace for high-risk devices or environments

Automatic cleanup of all activity during the session

Granular control of read/write access to printers, network drives, and removable media

Optionally filter web traffic through a secure proxy

GEARS + CounterACTGEARS for HIPAA Compliance

Page 17: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

In business 13 years

Headquartered in Campbell, California

200+ global channel partners

1,500+ customers worldwide

Financial services, government, healthcare, manufacturing, retail, education

From 500 to >500,000 endpoints

Focus: Pervasive Network Security

Independent Network Access Control (NAC) Market Leader

GEARS + CounterACTAbout ForeScout

Page 18: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTIntroducing CounterACT

Device type, owner, login, location

Applications, security profile

Captures transient users and devices

Real-time Intelligence

Page 19: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTIntroducing CounterACT

Device and user-specific policies

Mitigate OS, configuration and

security risks

Start/stop applications and disable peripherals

Real-time Intelligence

Granular Controls

Page 20: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTIntroducing CounterACT

Real-time Intelligence

Granular Controls

Information Sharing and Automation

Bi-directional information exchange

Automated mitigation and control

Enhancedcollaboration

Page 21: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTIntegration

http://www2.opswat.com/integrate-forescout-counteract-gears

Page 22: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

GEARS + CounterACTDemo

Page 23: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Enforce encryption of system volumes and other drives

Enforce use of password protection

Enforce use of functioning anti-malware software

Block access for devices that are not compliant, ensuring they do not reach sensitive resources

GEARS + CounterACTProve HIPAA Compliance

Page 24: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Q&A

Read more about CounterACT at http://www.forescout.com/product/counteract/

Sign up for a free GEARS account to try it out at https://www.opswatgears.com

GEARS + CounterACTLearn more

Page 25: GEARS + CounterACT · Assess device posture with deep host checking vs. security baseline Detect compromised or vulnerable devices: On the network or remote Inform end-users about

Thank youAdvanced Compliance Enforcement for Healthcare

[email protected]