San Jose, CA, USA
If the opinion of every UK business leader was surveyed back in February 2020, it's very likely cybersecurity wasn't at the top of their priority list. Fast forward to December 2021, and the reality is very different. Steep rises in data breaches, ransomware attacks and phishing scams in recent months, means many organisations are frantically trying to bolster their security operations, in a bid to keep pace with the evolving and progressively more complex cyber threat landscape they are now facing heading into 2022.
Dec 15, 2021   |  By Forescout
Leading healthcare provider minimizes risks of expanding IoT attack surface - 66% previously unknown devices identified on network.
Dec 13, 2021   |  By Forescout
Forescout Technologies today announced that it has been named a Customers' Choice in the November 2021 Gartner Peer Insights 'Voice of the Customer': Network Access Control report. Forescout received the high overall rating of 4.5 out of 5 stars for the second consecutive year.
Dec 13, 2021   |  By Tim Jones
COVID-19 made moving agency employees and services off-premises essential. This move, however, has also sparked one of the biggest waves of cybercrime the internet has ever seen. Ransomware attacks have been particularly effective against government agencies and critical infrastructure.
Dec 12, 2021   |  By Forescout Research Labs
Updated 12/20/21 On December 9, 2021, Apache published a zero-day vulnerability (CVE-2021-44228) for Apache Log4j being referred to as “Log4Shell”. This “critical” vulnerability (CVSS score: 10) allows a remote attacker to take control of an affected system. When exploited, this vulnerability allows an attacker to run arbitrary code on the device, giving full control over to the attacker.
Dec 7, 2021   |  By Forescout Research Labs
As we look ahead to 2022, we should pause to reflect on the trends of the past year. Ransomware and supply chain attacks have become two of the top concerns for organizations following a series of high-profile attacks, such as those conducted against Colonial Pipeline, SolarWinds and Kaseya. In 2021, our Project Memoria revealed close to 100 different vulnerabilities in common TCP/IP stacks, affecting hundreds of operational technology (OT) vendors.
Dec 7, 2021   |  By Koren Molcho
On November 10, 2021, Palo Alto Networks released advisories for eight different vulnerabilities affecting the company’s VPN firewall products. The vulnerabilities’ criticality ranges from ‘medium’ to ‘critical,’ with the most severe vulnerability, CVE-2021-3064 (CVSSv3.1 of 9.8), allowing for unauthenticated remote code execution, or RCE.
Nov 11, 2021   |  By Forescout Research Labs
Project Memoria is the largest study on the security of TCP/IP stacks. The idea for this project emerged in May 2020 while collaborating with JSOF on Ripple20. Our researchers understood that the problem with TCP/IP stacks was much deeper and more widespread than initial research had suggested. We hypothesized that similar issues to those identified in Ripple20 could be present in other stacks as well.
Nov 9, 2021   |  By Forescout Research Labs
Forescout Research Labs, with support from Medigate Labs, have discovered a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack, which we are collectively calling NUCLEUS:13. The new vulnerabilities allow for remote code execution, denial of service, and information leak. Nucleus is used in safety-critical devices, such as anesthesia machines, patient monitors and others in healthcare.
Nov 4, 2021   |  By Daniel Trivellato
Forescout is proud to be recognised by Forrester in its inaugural Industrial Control Systems (ICS) Security Solutions Wave, 2021. The ability to cover the most ICS protocols allows us to provide the best visibility compared to any other vendor, making the Forescout platform the solution of choice for any organization struggling with ICS asset visibility.
Dec 27, 2021   |  By Forescout
Learn how to detect vulnerable managed assets with eyeSight and potentially exploited endpoints with eyeInspect. To download the latest Security Policy Templates, login to the Customer Support Portal. For the latest IOC / Industrial Threat Library - Please log into the Forescout OT/ICS portal.
Dec 27, 2021   |  By Forescout
Learn how to integrate eyesight into your existing PXgrid implementation.
Dec 3, 2021   |  By Forescout
With so many agentless devices being deployed every day, it’s never been harder to protect your network from threats. Forescout delivers actionable information so you can see the devices on your network and take action to prevent them from compromising your enterprise.
Nov 8, 2021   |  By Forescout
In the fifth study of Project Memoria – NUCLEUS:13 – Forescout Research Labs and Medigate identified a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack. Nucleus is currently owned by Siemens. Its original release was in 1993 and, since then, it has been deployed in many industry verticals with safety and security requirements such as medical devices, automotive, and industrial systems. Upon identification of the new vulnerabilities, Forescout Research Labs and Medigate collaborated with Siemens, CISA, CERT/CC and other agencies to confirm the findings and notify vendors.
Oct 12, 2021   |  By Forescout
Learn how to quickly create profiles to simplify switch management across your enterprise in the Forescout platform.
Oct 5, 2021   |  By Forescout
Watch this quick video to get some highlights of Forescout 8.3.
Sep 7, 2021   |  By Forescout
Learn how to use add syslog parsing in your eyeExtend Connect app to populate Forescout's IOC database.
Sep 3, 2021   |  By Forescout
Does your environment have sites that have overlapping or re-used IP addresses? Learn how to configure eyeSight to support these network topologies.
May 21, 2021   |  By Forescout
Criminals Hacked the National Oil Supply Chain… Now What?
May 7, 2021   |  By Forescout
Learn how to solve some of your segmentation needs by integrating with Check Point NGFW and Forescout's platform.
Dec 22, 2021   |  By Forescout
The IT landscape is rapidly evolving to meet the demands of our digitally transforming world and a radically changed business environment that calls for always-on performance and agility at scale. As a result, client-server computing has given way to disruptive IT architectures that reshape business and ownership models. These include private and public cloud services, 'bring your own device' (BYOD), mobility and the Internet of Things (IoT).
Dec 22, 2021   |  By Forescout
They are designed to secure the assets of these essential services. There are 11 standards in total, covering everything from the protection of critical cyber assets to security management, personnel & training, incident reporting, and recovery planning. In this free eBook we explore how the continuous network monitoring capabilities of eyeInspect can streamline your compliance with these NERC CIP standards, saving you considerable time and money.
Dec 1, 2021   |  By Forescout
That's because perimeter-focused security architectures that default to high trust levels on the internal network are ill-suited for an edgeless enterprise that increasingly supports mobile and remote workers as well as vast numbers of IoT devices. This Forescout white paper explains why visibility is essential for effective Zero Trust architecture and how continuous visibility can help you identify, segment and enforce compliance using Zero Trust principles. It also addresses foundational capabilities Forrester Research requires to designate solutions as a Zero Trust platform.
Dec 1, 2021   |  By Forescout
With a staggering majority of devices - expected to reach more than 75 billion by 2025 - connected to vast networks and the internet, reducing cyber risk becomes a critical focal point for the age of IoT.
Nov 1, 2021   |  By Forescout
The drive to increase productivity and reduce costs in manufacturing environments has led to an exponential increase in the adoption of automation on plant floors, also known as Industry 4.0. If your organization has integrated its computation, networking and physical processes, this whitepaper will explain how deploying network monitoring technology will bring tremendous value to both your IT and OT teams.
Nov 1, 2021   |  By Forescout
The diverse and complex nature of IIoT and OT security use cases can make the technology selection difficult, and unfortunately, copying IT security practices and technology will not result in a secure OT environment. To achieve lasting success with OT cybersecurity investments, managers must ask prescriptive questions during the technology procurement process. In this eBook, we discuss the seven questions recommended by Gartner for SRM leaders to ask during their OT security technology selection and how Forescout answers them.

With so many agentless devices being deployed every day, it’s never been harder to protect your network from threats. Forescout delivers actionable information so you can see the devices on your network and take action to prevent them from compromising your enterprise.

Forescout Technologies, Inc. actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Fortune 1000 companies trust Forescout as it provides the most widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.

Forescout arms customers with more device intelligence than any other company in the world, allowing organizations across every industry to accurately classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets. Don’t just see it. Secure it.

See Every Device. Defend Your Entire Network.