FORESCOUT TECHNOLOGIES


Associated tags: Enterprise, Anomaly, OT, Intelligence, Internet of things, Security, Software, Risk management, Networks, Internet, Data Management, Automation

Forescout Announces Premium, Gold, and Diamond Support Offerings to Accelerate Customer Results

Retrieved on: 
Tuesday, May 21, 2024

Forescout Technologies Inc ., a global cybersecurity leader, today announced new tiered support offerings to accelerate customer results: Premium, Gold, and Diamond.

Key Points: 
  • Forescout Technologies Inc ., a global cybersecurity leader, today announced new tiered support offerings to accelerate customer results: Premium, Gold, and Diamond.
  • The new offerings combine quick response, reactive support, and forward-looking, proactive services to help customers continually improve their use of Forescout’s platform.
  • “Our new support offerings ensure that all customers have access to our technical experts’ depth of knowledge and experience to realize value from our platform as quickly as possible,” said Ellen Sundra, Chief Customer Officer, Forescout.
  • “Our certified engineers and architects are the best in the industry, and we’re making sure every customer can fully benefit from their product knowledge and experience with industry best practices.”
    Technical assistance 24 hours a day, 7 days a week, 365 days a year
    Proactive support including reviewing current architecture, device visibility and control policies, and use case planning

Forescout Forms Strategic Partnership with Microsoft to Secure Managed and Unmanaged Devices

Retrieved on: 
Tuesday, May 14, 2024

Forescout Technologies, Inc., a global cybersecurity leader, today announced a strategic partnership to help customers protect every enterprise asset, both managed and unmanaged.

Key Points: 
  • Forescout Technologies, Inc., a global cybersecurity leader, today announced a strategic partnership to help customers protect every enterprise asset, both managed and unmanaged.
  • With the exponential growth of connected devices in IT and OT landscapes, companies are challenged with managing and securing numerous unmanaged and un-agentable assets.
  • Our strategic alignment with Microsoft will accelerate our mission to provide comprehensive security across both managed and unmanaged devices to help customers further strengthen the security of their modern enterprises.”
    Get the details on this partnership in the webinar, Maximize Cyber-Resilience with Forescout and Microsoft.
  • Forescout and Microsoft have been working together to build strategic solutions to help customers detect, protect, and respond to the latest risks and threats by combining the industry-leading technology of Forescout with Microsoft security solutions.

Forescout Expands Global Sharing of Threat Intelligence

Retrieved on: 
Tuesday, May 7, 2024

This landmark initiative led by its research arm Forescout Research - Vedere Labs , provides contextual threat intelligence to enhance global defenses and improve security posture.

Key Points: 
  • This landmark initiative led by its research arm Forescout Research - Vedere Labs , provides contextual threat intelligence to enhance global defenses and improve security posture.
  • This research and intelligence sharing initiative is critical to answering the questions that matter to harden global defenses against cyber risks.”
    Forescout is now a global threat intelligence partner for the Operational Technology Information Sharing and Analysis Center .
  • Forescout supports ACSC’s leadership in cybersecurity by sharing intelligence via its malware information sharing platform (MISP), ensuring ASD can continue to advise and assist in making Australia cyber secure.
  • Forescout leads the EE-ISAC threat intelligence task force supporting interdisciplinary energy leaders and shares critical intelligence to improve the resilience and security of European energy infrastructure.

New Research “Exposing the Exploited” Unveils Challenges of the Known Exploited Vulnerability Catalog

Retrieved on: 
Tuesday, May 7, 2024

Exposing the Exploited details how an over-reliance on legacy information databases and standard guidance drastically underrepresents the global threat landscape.

Key Points: 
  • Exposing the Exploited details how an over-reliance on legacy information databases and standard guidance drastically underrepresents the global threat landscape.
  • View the full release here: https://www.businesswire.com/news/home/20240507143608/en/
    Forescout Research - Exposing the Exploited (Graphic: Business Wire)
    “Vulnerabilities are being found, weaponized, and exploited in the wild faster than ever before, with 97 0-days exploited in 2023 and already 27 this year,” said Elisa Costante, VP of Research, Forescout Research – Vedere Labs.
  • While the CISA KEV list is a valuable resource and the most recognized catalog for exploited vulnerabilities, it does have certain limitations.
  • Our analysis reveals that the CISA KEV catalog is not exhaustive — we have observed exploited vulnerabilities in the wild that are absent from this catalog.

Forescout AI Sets the Bar to Secure Customer Data and Deliver Powerful Decision-Making and Efficiency

Retrieved on: 
Monday, May 6, 2024

Additionally, to prevent customer information from being embedded into the model, Forescout does not train its model using customer data and prompts are not embedded.

Key Points: 
  • Additionally, to prevent customer information from being embedded into the model, Forescout does not train its model using customer data and prompts are not embedded.
  • Forescout uses its best-in-class data science threat detection and risk assessments to deliver results while using generative AI to augment the outcomes.
  • Forescout AI supports the requirement to align business strategy with outcomes.”
    For additional insight, view the on-demand webinar , The Dark Side of AI: How Generative AI Empowers Hackers.
  • Forescout REM uses a generative AI LLM (large language model) to articulate intricate patterns in risk factor data.

Forescout Delivers New Levels of Cyber Confidence and Control for Connected Assets

Retrieved on: 
Monday, May 6, 2024

The enterprise attack surface from connected assets, including unmanaged devices, is outpacing security teams’ ability to protect critical digital assets.

Key Points: 
  • The enterprise attack surface from connected assets, including unmanaged devices, is outpacing security teams’ ability to protect critical digital assets.
  • Identifies Exposures: Forescout REM continuously identifies vulnerabilities across all cyber assets, managed and unmanaged, for real-time visibility into attack surface exposures.
  • With Forescout REM, security leaders can maximize efficiency and align security strategies with business objectives by providing intuitive, time-based insights into cyber asset risk history.
  • Detailed descriptions of risk factors associated with specific assets, including vulnerabilities, misconfigurations, and threats lead to more precise risk management strategies.

Forescout Research Elevates Warnings as Security Threats to Exposed Critical Infrastructure Go Ignored

Retrieved on: 
Tuesday, April 23, 2024

After incidents targeting Modicon and Wago PLCs, Forescout researchers reexamined these exposed devices one year after reporting some to CISA.

Key Points: 
  • After incidents targeting Modicon and Wago PLCs, Forescout researchers reexamined these exposed devices one year after reporting some to CISA.
  • Forescout Research employs its Adversary Engagement Environment (AEE) to conduct analysis, leveraging a blend of real and simulated connected devices.
  • The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.
  • Forescout products directly leverage this research, which is shared openly with vendors, agencies, and other researchers.

Forescout Expands Leadership Team with Seasoned Executives

Retrieved on: 
Thursday, April 18, 2024

Forescout Technologies Inc., a global cybersecurity leader, today announced the expansion of its leadership team – Clarissa Horowitz to Chief Marketing Officer and Craig Weimer to Vice President of Sales, Americas.

Key Points: 
  • Forescout Technologies Inc., a global cybersecurity leader, today announced the expansion of its leadership team – Clarissa Horowitz to Chief Marketing Officer and Craig Weimer to Vice President of Sales, Americas.
  • Horowitz and Weimer join recently appointed Duncan MacMurdy, Chief People Officer, and Edward Brown, Chief Legal Officer and Secretary, on the leadership team.
  • The nominations of Horowitz and Weimer follow recent appointments to the executive leadership team and further demonstrate the company’s ambitious growth plans.
  • “As Forescout continues to expand its global leadership in identifying and protecting managed and unmanaged connected cyber assets, the expertise and vision of this team will be instrumental in shaping our future growth,” said Barry Mainz, CEO at Forescout.

At 13 Attacks Per Second, Critical Infrastructure is Under Siege

Retrieved on: 
Wednesday, January 24, 2024

This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.

Key Points: 
  • This lull has given rise to a surge in exploits targeting network infrastructure and Internet of Things (IoT) devices.
  • Only 35% of exploited vulnerabilities made an appearance in the Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerabilities (KEV) list.
  • The overarching objective is to elevate responses to complex critical infrastructure attacks by leveraging the detailed insights and understanding derived from this specialized deception environment.
  • The AEE is maintained by Vedere Labs, a leading global team dedicated to uncovering vulnerabilities in and threats to critical infrastructure.

Sandworm Not All to Blame: Forescout Research Uncovers New Evidence Tied to Energy Sector Cyberattacks in Denmark

Retrieved on: 
Thursday, January 11, 2024

This suggests that Sandworm cannot be pointed to as the APT group associated with both waves of attacks.

Key Points: 
  • This suggests that Sandworm cannot be pointed to as the APT group associated with both waves of attacks.
  • Governments are increasingly taking proactive measures by allocating funding to initiatives aimed at fortifying the security posture of critical infrastructure within the energy sector.
  • Forescout Research conducted this analysis utilizing its AEE, which encompasses both real and simulated connected devices.
  • The goal is to enhance responses to intricate critical infrastructure attacks through detailed insights and understanding gained from this specialized testing environment.