Cyber Security
Forescout For OT Security: First Solution To Cover Managed And Unmanaged Devices Across All Purdue Levels Securing Cloud, Air-Gapped, And Hybrid Environments
By Business Wire
Share
The SaaS-Based Solution Expands Forescout’s Cloud Footprint
SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout Technologies, Inc., a global cybersecurity leader, today announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organizations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in cloud, completely air-gapped, or hybrid.
Forescout for OT Security combines:
- Proactive security and exposure management
- Threat detection powered by Forescout Research – Vedere Labs’ proprietary threat research of unmanaged devices
- Critical operational monitoring
- Control across cloud and on-premises networks
“The attack surface from connected assets, including unmanaged OT and IoT devices, is outpacing security teams’ ability to protect critical digital assets,” said Barry Mainz, Forescout CEO. “Organizations are spending millions on the latest visibility and detection technology and are still experiencing downtime or getting compromised by ransomware, exploits, known vulnerabilities, and zero days. They don’t need more visibility; they need actionable intelligence and control.”
Forescout for OT Security unifies multiple use cases into a single, streamlined solution, minimizing manual errors and helping to reduce the complexity of operational workflows. Key features include:
- Comprehensive operational and cybersecurity threat detection rules specifically designed for OT, IoT, and IT hybrid environments
- Expanded capabilities OT discovery and extraction including from network and wireless infrastructure
- Forescout AI-enhanced asset intelligence to track the effectiveness of response actions across the security ecosystem to reduce risk
- Forescout AI reporting with contextual insights about connected devices, potential causes of incidents, and recommended remediation steps
- Role specific dashboards provide custom views for operations, security, SOC analyst, and executive
- Actionable vulnerability prioritization using FS Vedere Labs Known Exploited Vulnerabilities (VL-KEV), an innovative approach to OT/IoT specific exploitation indicators using Vedere Labs’ proprietary threat research (the industry's largest curated database of actionable insights)
- Asset classification covering 18.7 million unique device profiles from the Forescout Research – Vedere Labs database.
Read our blog for more information.
Mainz continued: “We see an increasing number of customers looking for a comprehensive, enterprise-wide security strategy, and, with this release, we’re providing an industry-leading solution across OT, IT, and IoT environments.”
About Forescout
The Forescout cybersecurity platform provides complete asset intelligence and control across IT, OT, and IoT environments. For more than 20 years, Fortune 100 organizations, government agencies, and large enterprises have trusted Forescout as their foundation to manage cyber risk, ensure compliance, and mitigate threats. With seamless context sharing and workflow orchestration across more than 100 full-featured security and IT product integrations, Forescout makes every cybersecurity investment more effective.
Forescout Research – Vedere Labs is the industry leader in device intelligence, curating unique and proprietary threat intelligence that powers Forescout’s platform.
Contacts
RH Strategic for Forescout
forescoutpr@rhstrategic.comForescout Communications
press@forescout.com
First published on Thu, Sep 19, 2024
Enjoyed what you've read so far? Great news - there's more to explore!
Stay up to date with the latest news, a vast collection of tech articles including introductory guides, product reviews, trends and more, thought-provoking interviews, hottest AI blogs and entertaining tech memes.
Plus, get access to branded insights such as informative white papers, intriguing case studies, in-depth reports, enlightening videos and exciting events and webinars from industry-leading global brands.
Dive into TechDogs' treasure trove today and Know Your World of technology!
Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs' members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs' Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. All information / content found on TechDogs' site may not necessarily be reviewed by individuals with the expertise to validate its completeness, accuracy and reliability.
Tags:
Related News on Cyber Security
Trellix Launches Xtend Global Channel Partner Program
Wed, Feb 8, 2023
By Business Wire
Kaspersky Exits US, Forcibly Switches Users To UltraAV
Wed, Sep 25, 2024
By TD NewsDesk
ExtraHop Presents Ratiodata With Gold Partner Status
Wed, May 10, 2023
By Business Wire
Seraphic Security Named As A 2023 SC Awards Finalist
Tue, May 23, 2023
By Business Wire
Related Events & Webinars on Cyber Security
Trending Business Wire
Halan And Truecaller Collaborate To Redefine Communication Safety In Egypts Fintech Landscape
By Business Wire
Houston Area School District Is First In Texas To Add Powerschool AI Assistant Powerbuddy To Classrooms
By Business Wire
KAYTUS Unveils Next-Generation Air-Cooled Containerized AI Computing
By Business Wire
Mahindra & Mahindra Selects Kinaxis To Drive Supply Chain Efficiencies For Growing Automotive Portfolio
By Business Wire
Neo Financial Ranks No. 1 On The Globe And Mails 2024 List Of Canadas Top Growing Companies
By Business Wire
Join Our Newsletter
Get weekly news, engaging articles, and career tips-all free!
By subscribing to our newsletter, you're cool with our terms and conditions and agree to our Privacy Policy.
Join The Discussion