You are here: IT-Observer » Articles » Editorial RSS | White Papers |   

ForeScout CounterACT 5.1





ForeScout has announced the availability of CounterACT 5.1. The new version enhances CounterACT's ability to detect and disable rogue wireless access points deployed at any location on an enterprise network over the wire, eliminating an increasingly common vulnerability in enterprise networks. CounterACT ensures that unknown devices and endpoints that are non-compliant with the network security policies cannot gain access to critical infrastructure or sensitive information assets.

CounterACT is a network security device that provides clientless network access control NAC and Intelligent Intrusion Prevention by monitoring traffic entering and exiting the protected network segment. Once a network policy violation, self-propagating malware, or an intelligent hacker has been identified, CounterACT can automatically restrict or deny access to the network, block the threat or suppress propagation.

CounterACTs can be deployed across an enterprise and share security alters and policy violations, creating a uniform layer of security across all network segments.

"With seamless integration to 95% of the switches in use today, there is no need to 'rip and replace' existing equipment. Adding the ability to detect and shut down rogue wireless access points is yet another example of our commitment to customers to protect against all attack sources, “said T. Kent Elliott, CEO of ForeScout Technologies.

Version 5.1 of ForeScout’s CounterACT bolstering the product’s rouge wireless detection engine and adding 802.1x integation. ForeScout added additional security features such as self-remediation system and enables in-depth interrogation of unknown endpoints.

The rogue wireless detection engine can detect and disable a rogue wireless access point deployed at any location on the network without the need for additional RF equipment. The self-remediation system deploys PatchLink remediation system to ensure that users can immediately self-correct issues that may be preventing their access to the network without IT intervention.

"As employees and contractors increasingly access critical information assets via both internal, wireless, and VPN connections, ensuring each device is properly authorized is a nightmare," says Mike Rothman, President and Principal Analyst of Security Incite. "Network Access Control is a promising technology to simplify the enforcement of access and authorization policies, but winning solutions must integrate transparently into the existing infrastructure and not adversely impact the user experience."



Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information.

 

FREE IP PBX: 3CX VOIP Phone System for Windows. No timeouts or limitations

 

GFI LANguard N.S.S. NEW v8 out now!
Complete network vulnerability management, providing powerful vulnerability scanning, patch management and auditing solution. DOWNLOAD A 30-DAY TRIAL TODAY!

 

Latest News

eEye released integer overflow auditing tool
16.02.07  Vulnerability research company eEye Security has released a free security vulnerability auditing tool that helps spotting possible integer overflow vulnerabilities.

AES Password Manager 2.3 released
16.02.07  AES software has announced the availability of AES Password Manager 2,3, the latest version of their password management application that allows users automatically access password-protected web sites and email accounts.

IBM safeguards against Microsoft vulnerabilities
16.02.07  IBM’s security division, Internet Security Systems, offers protection from several critical vulnerabilities announced by Microsoft.

Firefox cookie-stealing vulnerability
15.02.07  A new zero-day vulnerability in Mozilla Firefox allows malicious web sites to forge authentication cookies for certain web sites.

Valentine’s Day: a powerful lure for spreading malware
09.02.07  As Valentine´s Day approaches, users should keep a wary eye on any romantic messages received by email, as many of them could contain malicious code.

Skype reads out your BIOS data
09.02.07  The Windows version of the Voice-over-IP software Skype reads and stores the BIOS and motherboard serial number of a user’s computer.

Utimaco SafeGuard Enterprise supports BitLocker
09.02.07  Utimaco has announced that its SafeGuard Enterprise now supports Windows Vista BitLocker drive encryption.

Copyright © IT-Observer Online Publication 2000 - 2007 Top | RSS Feeds | About Us   
Site Meter