Software delivers DOD vulnerability protection.

Press Release Summary:



CounterACT(TM) v5.1 provides automated compliance of Department of Defense Information Assurance Vulnerability Alerts. It identifies, quarantines, and remediates networked assets not compliant with IAVAs. By partnering with patch management vendors, CounterACT automatically initiates download and install necessary patches. Without any endpoint client, software identifies IAVA's status for network devices including laptops, desktops, and servers, as well as non-OS devices such IP Phones.



Original Press Release:



ForeScout Delivers Department of Defense Vulnerability Protection



CounterACT 5.1 Release Automates Compliance Check for Information Assurance Vulnerability Alerts (IAVA)

CUPERTINO, Calif., Jan. 30 - ForeScout Technologies, the leading provider of clientless Network Access Control (NAC) and policy enforcement solutions, today announced its release of CounterACT(TM) 5.1, providing customers with automated compliance of the Department of Defense (DOD) Information Assurance Vulnerability Alerts.

"ForeScout is committed to providing our customers with security technology that reduces the complex challenges of fulfilling compliance requirements," said T. Kent Elliott, CEO of ForeScout. "With the release of CounterACT 5.1, ForeScout addresses the needs of our Federal customers affected by IAVA by providing a solution that automates the identification and remediation process of non-compliant devices."

Cyber security alerts, known as IAVA's, are issued by the Joint Task Force for Global Network Operations (JTF-GNO) when new vulnerabilities have been identified. The alerts notify security officers within DOD agencies of any new cyber security vulnerability and the process for mitigation. In issuing the alerts, JTF-GNO also identifies specific assets subject to IAVA. Each security officer is responsible for reporting compliance status to the JTF-GNO of their managed assets for each IAVA.

CounterACT 5.1 provides automatic identification, quarantining, and remediation of networked assets not compliant with IAVA's. CounterACT automatically detects new assets as they connect to the network and quickly determines whether the IAVA is applicable to the device and if it is compliant. If a device is not IAVA compliant, CounterACT automatically quarantines the endpoint until it meets network policy requirements. By partnering with leading patch management vendors, CounterACT can automatically initiate the download and install necessary patches (including the patch management agent) required for remediation.

Network visitors to Federal institutions are required to have their laptops scanned by the IT department prior to connecting to the network to ensure they are IAVA compliant. This results in significant productivity loss due to delays in the ability to access the network, as well as a labor-intensive process for the IT staff. CounterACT automates this process, enabling compliant devices to join the network without delays or cumbersome manual processing.

CounterACT's advanced policy definition and enforcement capabilities enable security officers to respond to new alerts with network security policies that identify non-compliant devices applicable to the IAVA. Without requiring any form of endpoint client, CounterACT identifies IAVA's status for all network devices including laptops, desktops, servers and network enabled PDA's, as well as non-OS devices such as printers and IP Phones. Policies can be configured to determine whether devices are in compliance with an IAVA both before and after the connection. This ensures that the required network security policies are adhered to at all times.

CounterACT's highly flexible and granular policies provide the ability to selectively limit enforcement to specific assets, with specific operating systems, or specific vulnerabilities. Additionally, CounterACT is vendor agnostic and provides an open API for integration with most network elements/systems (e.g., backend databases, identity and asset management systems, trouble ticketing systems, etc.) expanding the ability to report on the specific compliance status of managed and unmanaged assets.

About ForeScout Technologies, Inc.
ForeScout's network security platform combines network policy enforcement and access control, malware containment and vulnerability assessment in an enterprise-class security appliance. ForeScout offers the ability to create and enforce granular network access policies in real-time without the need to change existing infrastructure. This provides a flexible, cost effective solution ensuring all endpoints are in compliance with corporate network security policies, a key component to regulatory compliance. ForeScout's customers include a wide range of Fortune 1000 corporations and government agencies. ForeScout's headquarters are located in Cupertino, California. For more information, please visit www.forescout.com.

All Topics