ForeScout technology encourages security management info sharing

ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.

The new ControlFabric interface technology also lets CounterAct, which is an appliance for monitoring and controlling network access while detecting vulnerability information, share information it has related to an enterprise network with other security vendors. A number of them, including McAfee, today indicated support for ControlFabric

[SECURITY:It's a BYOD world'--with a catch--at New York Law School]

Ed Barry, vice president of the McAfee security innovation alliance, says McAfee has had a long relationship with ForeScout, for example by working to share security information with McAfee's ePolicy Orchestrator. The next step is leveraging ControlFabric to share threat-detection and other information between CounterAct and the McAfee Enterprise Security Manager (ESM), a security information and event management (SIEM) product. Other projects in the works involve sharing vulnerability-assessment data. "Some things McAfee sees, some things ForeScout sees," says Barry about why combining information across vendor boundaries makes sense. "The idea is to create nimble security."

Jon Oltsik, senior principal analyst at Enterprise Strategy Group, says ControlFabric "represents a flexible approach to gain the context and policies necessary to advance endpoint compliance, continuous monitoring and security analytics."

ForeScout says ControlFabric is being supported by vendors that include mobile-device management vendors in the form of plug-in modules for AirWatch, Citrix, Fiberlink. MobileIron and SAF Afaria.

In addition to McAfee's ESM, other SIEM products supporting ControlFabric include HP ArcSight, IBM QRadar, RSA Envision, Splunk Enterprise and Tibco LogLogic. In terms of Advanced Threat Detection, support for FireEye is said to be available and a module is also planed for McAfee's upcoming Advanced Threat Defense sandboxing product.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: emessmer@nww.com

Read more about wide area network in Network World's Wide Area Network section.

Tags: orchestra, mcafee, security, Networking, ForeScout Technologies, infrastructure management, ForeScout, Wide Area Network, SIEM, management

Fifteen years legal, Australian e-signature use still lags world

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Secure Virtualization of Business Applications

Run your mission-critical applications in a secure and compliant virtual datacenter, or private cloud.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.