sb-au logo
Story image

ForeScout deepens visibility into OT networks with industrial system integrations

18 Jun 2018

Internet of things (IoT) security company ForeScout Technologies announced partnerships with Indegy and SecurityMatters to integrate these technologies into its visibility platform and secure operational technology (OT) and industrial environments.

With this new category of industrial control system (ICS) partnerships, ForeScout continues with its strategy to provide visibility across the extended enterprise – from campus, data centre, cloud to OT networks.  “The essential systems that are foundational to a nation’s economy, security and health are being connected to IT systems and becoming increasingly vulnerable to cyber threats,” says ForeScout chief strategy officer Pedro Abreu.

“Cyberattacks on critical infrastructure introduce dangerous risks that go beyond financial loss or business disruption, and can threaten physical safety,” he says.

ForeScout adds new integrations for industrial control systems 

As operational and industrial control systems connect to IT environments, it’s critical for organisations to build and maintain an asset inventory of every device in every ICS layer and ensure compliance with industry regulations and security standards.

However, ICS devices create unique challenges for organisations because most cannot support traditional security methods, and are sensitive to legacy scanning and monitoring techniques.

Also, given the importance of critical infrastructure, many of these devices cannot be taken offline for maintenance and patching.  ForeScout’s agentless visibility and control solution provides comprehensive inventory and device compliance capabilities for network-connected devices.

By partnering with Indegy and SecurityMatters, ForeScout now offers deeper visibility into every layer of ICS environments, including SCADA systems, programmable logic controllers (PLC) and sensors.

With partners sharing device data, ForeScout consolidates governance to deliver visibility and control of all ICS and IT assets while enabling device compliance, incident detection and response, and effective risk mitigation across the entire environment.  According to a May 2018 Gartner report by Saniye Burcu Alaybeyi, 2018 Strategic Roadmap for Integrated IT and OT Security, “OT networks have been unmanaged, from a security and risk perspective, for many years.

“They are flat, with a mix of OT protocols, unidentified assets, legacy systems and devices with unsecure communications... Successful security governance in an integrated IT/OT environment must be able to balance enterprise-wide objectives with the combined risk appetite and the capability to secure and protect the two domains.”  Leveraging insights from our partnerships with Indegy and SecurityMatters, ForeScout delivers the following integrated security capabilities across IT, OT and critical infrastructure environments:  •  End-to-end agentless visibility and security  •  Automated asset discovery and management  •  Real-time threat detection and contextual alerts  •  Continuous validation of asset configurations and compliance  •  Deeper incident response and threat mitigation  ForeScout integrations for Indegy and SecurityMatters are generally available now. 

Story image
ExtraHop brings SaaS network detection and response solution to market
"Reveal(x) 360 is the culmination of a multi-year R&D investment to secure data centre, remote sites, and cloud workloads with frictionless deployment and actionable insights that can be securely accessed from anywhere.”More
Story image
Report: Tech industry most attacked sector
"The current global crisis has shown us that cyber criminals will always take advantage of any situation and organisations must be ready for anything."More
Story image
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.” More
Story image
Nuance revamps AI authentication to protect seniors from fraud
The tool utilises intelligence voice detection capabilities to let enterprises identify if callers are over the age of 65 and, if so, prioritise their call, get them to a live agent for service and better protect them from fraud.More
Story image
Cybercriminals exploiting virus fears to gain access to corporate IT systems
COVID-19 may have changed the way many people work, but this doesn’t have to mean companies must accept lower levels of security. More
Story image
HackerOne hits $100M milestone with bug bounties
“We have arrived at the point in history where you are ignorant and negligent if you do not have a way to receive useful input from ethical hackers."More