ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, today announced new ForeScout Extended Modules for the Palo Alto Networks Next-Generation Security Platform to help joint customers improve network protection and response.
Through these new modules, ForeScout integrates its real-time device scanning with the Palo Alto Networks Next-Generation Security Platform, including its Next-Generation Firewall and WildFireTM cloud-based malware prevention service, to provide joint customers with improved visibility and control of their network-connected devices. This approach gives joint customers the ability to detect and prevent advanced threats, implement dynamic network segmentation, enforce access based on user, device and security context, and automate response to indicators of compromise (IOCs).
"IoT devices significantly increase the enterprise attack surface, allowing stealthy attacks to bypass security defenses and move laterally across flat networks to access corporate and proprietary information," said Michael DeCesare, president and CEO, ForeScout. "By leveraging the integration between ForeScout and Palo Alto Networks, organizations will be able to see and control these devices for dynamic network segmentation and automated response. ForeScout works in the most complex multi-network environments without the need to rip and replace existing technologies so customers reduce costs and improve time-to-value."
The Palo Alto Networks Next-Generation Firewall is architected to safely enable applications and prevent advanced cyber threats by classifying all traffic, including encrypted traffic, based on application, application function, user and content. Palo Alto Networks WildFire is the industry's most advanced cloud-based analysis and prevention service for highly evasive zero-day malware and exploits.
In conjunction with ForeScout CounterACT, the ForeScout Extended Modules for Palo Alto Networks leverages complementary capabilities of each solution, which allows customers to:
- Gain comprehensive visibility into users and devices on their network without requiring an agent;
- Enforce access controls based on up-to-date user and device context;
- Implement dynamic network segmentation to reduce their attack surface;
- Detect advanced persistent threats (APTs) and scan for indicators of compromise (IOCs); and
- Automate threat response to limit malware proliferation and impact of breaches.