CDM….Where do you start? (OA Cyber Summit)
-
Upload
open-analytics -
Category
Technology
-
view
521 -
download
3
Transcript of CDM….Where do you start? (OA Cyber Summit)
Ellen Sundra, CISSP
Senior Federal Systems Engineer, ForeScout
ForeScout in Conjunction with 4K Solutions
© 2014 ForeScout Technologies, Page 2
VISIBLE NOT VISIBLE
Corporate Resources
NetworkDevices
Endpoints
Applications
Users
Antivirus out of date
Unauthorized application
Agents not installed or not running
Non-corporate
© 2014 ForeScout Technologies, Page 3
Control Access Based on Compliance
Incident ResponseCompliance Dashboard
CompleteVisibility
Enforcement Remediation
Information Sharing
Endpoint Interrogation & Authentication
Device Discovery, Profiling [HW/SW USER LOC ...]
Multi-factor, Complete,Clientless, Access Control
Continuous
Monitoring
Challenge• Asset visibility
• Access and threat dynamics
• Endpoint and infrastructure diversity
• Network authentication and control
• Dynamic threats and remediation costs
Solution• Pre-admission user/device
authentication and authorization
• Continuous endpoint diagnostics, posture assessment and mitigation
• Port-based control and broad device policy enforcement
• Infrastructure agnostic, interoperable, scalable, works with enterprise tool sets Natively or Using Existing
Enterprise Tools
© 2014 ForeScout Technologies, Page 4
OpenPlatform
MDM
SIEM
Vulnerability
Assessment
Endpoint Protection
EndpointsNetwork
Infrastructure
AdvancedThreatDetection
Identity
© 2014 ForeScout Technologies, Page 5
Deployment Timeline
Change Control Boards can study the water and take a stair-step approach
to implementing change
Enforcement is Limited to a Small Number of Policy
Violators Level of Non- Compliance
Control Network Access at Anytime
© 2014 ForeScout Technologies, Page 6
Questions?
Thank you!
© 2014 ForeScout Technologies, Page 6
Questions?
Thank you!