Press ReleaseCloud SecurityDevice & IoTMobile & WirelessThreat Detection & Defense

Forescout for OT Security: First Solution to Cover Managed and Unmanaged Devices Across All Purdue Levels Securing Cloud, Air-Gapped, and Hybrid Environments

Forescout Technologies, Inc., a global cybersecurity leader, today announced its new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first security solution that allows organisations to secure complex, heterogeneous OT, IoT/IoMT, and IT environments whether they are fully in the cloud, completely air-gapped, or hybrid.

Forescout for OT Security combines:

  • Proactive security and exposure management
  • Threat detection powered by Forescout Research – Vedere Labs’ proprietary threat research of unmanaged devices
  • Critical operational monitoring
  • Control across cloud and on-premises networks

“The attack surface from connected assets, including unmanaged OT and IoT devices, is outpacing security teams’ ability to protect critical digital assets,” said Barry Mainz, Forescout CEO. “Organisations are spending millions on the latest visibility and detection technology and are still experiencing downtime or getting compromised by ransomware, exploits, known vulnerabilities, and zero days. They don’t need more visibility; they need actionable intelligence and control.”

Forescout for OT Security unifies multiple use cases into a single, streamlined solution, minimising manual errors and helping to reduce the complexity of operational workflows.

Key features include:

  • Comprehensive operational and cybersecurity threat detection rules specifically designed for OT, IoT, and IT hybrid environments
  • Expanded capabilities OT discovery and extraction including from network and wireless infrastructure
  • Forescout AI-enhanced asset intelligence to track the effectiveness of response actions across the security ecosystem to reduce risk
  • Forescout AI reporting with contextual insights about connected devices, potential causes of incidents, and recommended remediation steps
  • Role-specific dashboards provide custom views for operations, security, SOC analyst, and executive
  • Actionable vulnerability prioritisation using FS Vedere Labs Known Exploited Vulnerabilities (VL-KEV), an innovative approach to OT/IoT specific exploitation indicators using Vedere Labs’ proprietary threat research (the industry’s largest curated database of actionable insights)
  • Asset classification covering 18.7 million unique device profiles from the ForescoutResearch – Vedere Labs database.

For more information, kindly read the blog here.

Mainz continued: “We see an increasing number of customers looking for a comprehensive, enterprise-wide security strategy, and, with this release, we’re providing an industry-leading solution across OT, IT, and IoT environments.”

OT Security

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *