CDM….Where do you start? (OA Cyber Summit)

Post on 14-Jul-2015

521 views 3 download

Tags:

Transcript of CDM….Where do you start? (OA Cyber Summit)

Ellen Sundra, CISSP

Senior Federal Systems Engineer, ForeScout

ForeScout in Conjunction with 4K Solutions

© 2014 ForeScout Technologies, Page 2

VISIBLE NOT VISIBLE

Corporate Resources

NetworkDevices

Endpoints

Applications

Users

Antivirus out of date

Unauthorized application

Agents not installed or not running

Non-corporate

© 2014 ForeScout Technologies, Page 3

Control Access Based on Compliance

Incident ResponseCompliance Dashboard

CompleteVisibility

Enforcement Remediation

Information Sharing

Endpoint Interrogation & Authentication

Device Discovery, Profiling [HW/SW USER LOC ...]

Multi-factor, Complete,Clientless, Access Control

Continuous

Monitoring

Challenge• Asset visibility

• Access and threat dynamics

• Endpoint and infrastructure diversity

• Network authentication and control

• Dynamic threats and remediation costs

Solution• Pre-admission user/device

authentication and authorization

• Continuous endpoint diagnostics, posture assessment and mitigation

• Port-based control and broad device policy enforcement

• Infrastructure agnostic, interoperable, scalable, works with enterprise tool sets Natively or Using Existing

Enterprise Tools

© 2014 ForeScout Technologies, Page 4

OpenPlatform

MDM

SIEM

Vulnerability

Assessment

Endpoint Protection

EndpointsNetwork

Infrastructure

AdvancedThreatDetection

Identity

© 2014 ForeScout Technologies, Page 5

Deployment Timeline

Change Control Boards can study the water and take a stair-step approach

to implementing change

Enforcement is Limited to a Small Number of Policy

Violators Level of Non- Compliance

Control Network Access at Anytime

© 2014 ForeScout Technologies, Page 6

Questions?

Thank you!

© 2014 ForeScout Technologies, Page 6

Questions?

Thank you!