Download presentation
Presentation is loading. Please wait.
Published byGriffin McDaniel Modified over 8 years ago
2
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security incidents Regulatory mandates PCI HIPAA HITECH NIST SOX NERC $ 5.9 million 2014 2013 $ 3.9 million Source: 2015 Global State of Information Security Survey, PwC Among companies with revenues over $1 billion
3
© 2015 ForeScout Technologies, Page 3 76 Million Households affected Hackers took over a remote server the bank failed to properly update 21m government employees identities stolen OPM did not maintain a comprehensive inventory of servers, databases and network devices 11m customers’ medical and financial data stolen Premera’s network security procedures were inadequate Cyber attack could cost as much as $100 million Disabled the antivirus in the target machines without detection 80m customer records stolen “Suspicious” administrator activity went unnoticed for months “44 percent of known breaches came from vulnerabilities that are 2 to 4 years old” HP Cyber Risk Report 2015 53 million email addresses and 56 million credit cards Attackers used stolen vendor credential to access critical systems The Home Depot
4
© 2015 ForeScout Technologies, Page 4 Managed Devices Unmanaged Devices Source: Gartner, BI Intelligence, Verizon, ForeScout Less than 10% of new devices connecting to the corporate environment will be manageable through traditional methods 201020122014201620182020 By 2020: 20+ Billion Unmanaged Connected Devices Dec 2014: “Within two years, 90% of all IT networks will have an IoT-based security breach”
5
© 2015 ForeScout Technologies, Page 5 Security products are silos. Human beings are needed to compensate for lack of automation. SecOps teams are overwhelmed and cannot respond in timely fashion. FIREWALL SIEMATDVA ENDPOINT PATCHEMM IBM “70 to 90 percent of all malicious incidents could have been prevented or found sooner if existing logs and alerts had been monitored” Verizon Data Breach Investigations Report “Average time to contain a cyber attack is 31 days” Ponemon Institute “2014 Global Report on the Cost of Cyber Crime”
6
© 2015 ForeScout Technologies, Page 6
7
© 2015 ForeScout Technologies, Page 7 Not VisibleVisible Visible with IoT ManagedUnmanaged DIRECTORIES PATCH SIEM ATD VA EMM OTHER Computing Devices Network Devices Applications Antivirus out-of-date Broken agent Vulnerability Continuous Agentless
8
© 2015 ForeScout Technologies, Page 8 Users EndpointsNetwork Existing IT INFORM ADJUST ALERT SEGMENT Automated Policy-driven
9
© 2015 ForeScout Technologies, Page 9 Automate workflows Share context IBM ControlFabric Open APIs
10
© 2015 ForeScout Technologies, Page 10 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet 1 1 See corporate, BYOD, IoT, rogue devices. 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 IBM Directories
11
© 2015 ForeScout Technologies, Page 11 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices. 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 1 2 Rogue Devices IBM Directories
12
© 2015 ForeScout Technologies, Page 12 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices. 1 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 3 IBM Directories
13
© 2015 ForeScout Technologies, Page 13 FIREWALL SIEMATD ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesRogue DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices. 1 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 4 IBM Directories VA
14
© 2015 ForeScout Technologies, Page 14 EMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices. 1 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 5 FIREWALL SIEMATDVA ENDPOINT PATCH IBM Directories
15
© 2015 ForeScout Technologies, Page 15 FIREWALL SIEMATDVA ENDPOINT PATCHEMM Network Infrastructure Managed DevicesBYOD DevicesIoT Devices Network Internet See corporate, BYOD, IoT, rogue devices. 1 2 3 4 Detect transient devices and trigger real-time vulnerability scans Automate enrollment for guests and BYOD including mobile devices Find and fix vulnerabilities and security problems on managed endpoints 5 Rapidly respond to incidents, without human intervention Control network access based on user, device, policy 6 6 IBM Directories
16
© 2015 ForeScout Technologies, Page 16 Real-time visibility No gaps No agents Broad range of responses User Network Endpoint Existing IT systems Information sharing and automation Reduce security fragmentation Speed incident response
17
© 2015 ForeScout Technologies, Page 17 *Magic Quadrant for Network Access Control, December 2014, Gartner Inc. *This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from ForeScout. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Gartner "Magic Quadrant for Network Access Control,” Lawrence Orans and Claudio Neiva, December 10, 2014.
18
© 2015 ForeScout Technologies, Page 18 Questions
19
© 2015 ForeScout Technologies, Page 19
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.