ForeScout Network Access Control Extends McAfee Security Visibility

Security firm ForeScout Technologies has expanded its functionality to work with security products from McAfee. The latest integration allows customers to use ForeScout's CounterACT, the company's network access control product, with McAfee's Enterprise Security Manager (ESM), a set of programs for doing enterprise-wide security information and event management (SIEM).

About a year ago ForeScout announced that it had integrated CounterACT with McAfee's ePolicy Orchestrator, which gave customers a way to see endpoints the moment they tried to connect to the network, and the ability to control those devices for compliance.

The purpose of the new integration is to provide organizations with a way to monitor device activities identified by CounterACT in McAfee's ESM, including network access violations, endpoint compliance problems, and mobile security issues.

The pursuit of simplicity in managing security threats is an idea that has been backed up by IT analyst firm Gartner. "Although many SIEM deployments have been funded to address regulatory compliance reporting requirements, the rise in successful targeted attacks has caused a growing number of organizations to use SIEM for threat management to improve security monitoring and early breach detection," stated the May 2012 Gartner report, "Magic Quadrant for Security Information and Event Management." "There is a danger of SIEM products (which are already complex) becoming too complex as vendors extend capabilities. Vendors that are able to provide deployment simplicity as they add function will be the most successful in the market."

ForeScout CounterACT provides the means for the security administrator to see and control devices connected to the network without an agent running on the endpoint device. IT can use it to set and enforce network usage policy rules, such as identifying and quarantining devices that don't comply with security rules or that exhibit malicious behavior. It's available as a physical appliance or as software that can run in a virtual server environment.

"By supporting interoperability between [the two products], we can give our mutual customers an effective way to extend situational awareness and to enforce access, mobile, and endpoint compliance controls for all users and devices," said Ed Barry, a McAfee vice president. "The joint solution will enable more rapid remediation of enterprise-wide threats that can originate from non-compliant endpoints."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • magnifying glass with AI icon in the center

    Google Releases Learning-Themed AI Mode Features for Search

    Ahead of back-to-school season, Google has introduced new AI Mode features in Search, including image and PDF queries on desktop, a Canvas tool for planning, real-time help with Search Live, and Lens integration in Chrome.

  • student holding a smartphone with thumbs-up and thumbs-down icons, surrounded by abstract digital media symbols and interface elements

    Teaching Media Literacy? Start by Teaching Decision-Making

    Decision-making is a skill that must be developed — not assumed. Students need opportunities to learn the tools and practices of effective decision-making so they can apply what they know in meaningful, real-world contexts.

  • open laptop with various educational materials like charts, quizzes, and documents emerging from the screen

    Pear Deck Learning Debuts New AI Features

    GoGuardian recently introduced new artificial intelligence features within its Pear Deck Learning curriculum and instruction platform, designed to aid educators throughout their teaching journey — from lesson planning to assessment.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.