Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Approval for CounterACT use with US army

ForeScout Technologies : 17 December, 2008  (New Product)
With US army approval, CounterACT network access control can be used for protecting army network assets from unauthorised access
ForeScout Technologies has announced that its CounterACT network access control (NAC) solution has been added to the United States Army Information Assurance Approved Products List (AIAAPL). It is the only NAC solution on the AIAAPL today.

"The addition of our CounterACT CT-1000 solution to the AIAAPL demonstrates our product has been rigorously tested and proven to meet the Army's high standards for security, ease of use and deployment, low end-user impact, and interoperability with existing remediation solutions and infrastructure requirements," said Gord Boyce, president of ForeScout Technologies. "ForeScout continues to partner with customers across all verticals to deliver products that meet and exceed their network security requirements. This is another milestone in CounterACT's three-year history of achievements with the Department of Defence (DoD), such as successful testing at the Army Technology Integration Centre (TIC), FIPS-140-2 Level 2 compliance, receipt of Common Criteria certification (Evaluation Assurance Level 2, with EAL4 pending), and more."

Much of CounterACT's success in the DoD and other Federal accounts has to do with its ability to see every IP device connected to the network, control all connections down to the switch port, and provide complex policies to enable and enforce security processes and standards. Access control is performed without the need to first deploy 802.1x, and enforcements can include actions such as post-connection monitoring for threat prevention, detection/blocking of banned devices (such as USBs in the DoD).

For instance, with the CounterACT Scan-to-Connect IAVA-Compliance integration module, any device or user connecting to IT resources can be detected, scanned for groups of vulnerabilities, and granted access in accordance with organisational standards. "Our mutual DoD customers use the ForeScout CounterACT Scan-to-Connect IAVA-Compliance plug-in with the eEye Retina Network Security Scanner to complete real-time IAVA (Information Assurance Vulnerability Alerts) compliance scans of connecting devices," said Morey Haber, vice president of business development, eEye Digital Security. "With our joint solution, any DoD network user attempting to connect using an out-of-compliance device can be automatically detected and blocked, or placed in a quarantine VLAN for remediation before it is allowed to fully connect to the production network. Remediation steps can include OS updates, security patches or anti-virus software installation/updates. This eliminates laptop vulnerabilities in real-time and preserves the vital uptime of DoD networks."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo