Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

CounterACT network security management for US health group

ForeScout Technologies : 05 June, 2008  (Application Story)
Pennsylvania hospitals gain improved network access control and intrusion prevention with CounterACT from ForeScout Technologies
ForeScout Technologies has announced that Lehigh Valley Hospital and Health Network (LVHHN), a premier academic community hospital and health services provider in Allentown and Bethlehem, Pennsylvania, has deployed the CounterACT family of appliances to mediate access to its health services network.

According to Brian Martin, Information Security Manager for LVHHN, "Our network users - including doctors, nurses, specialists, and visiting guests − were bringing their own, sometimes infected computers into work. Some of these computers weren't compliant with our security policies and needed OS updates, security patches or anti-virus software installed. Others were hospital property that had been used off-site, picked up malware, and began setting off alarms when they reconnected to the Lehigh network. We wanted a way to control these conditions and let users self-correct the problems."

Martin and his colleagues began looking for a network access solution that would also detect and respond to malicious behavior that a simple intrusion detection solution would not pick up. After evaluating solutions from various NAC and infrastructure providers, the organization chose ForeScout's CounterACT.

"I was bowled over by the detection capabilities of CounterACT," said Martin. "That you get a two-in-one intrusion prevention and NAC solution in CounterACT just makes it that much better. Plus, you hear about NAC being tricky and difficult to deploy: that hasn't been the case for us. The deployment was one of our smoothest. It took under a week and is now protecting over 20,000 endpoints."

Today's health enterprises - like Lehigh Valley - face a steady influx of vulnerabilities introduced by guests and employees who are able to bypass physical security and gain network connection inside the perimeter defenses. CounterACT addresses this problem by enforcing network security policies across all managed and unmanaged network devices, including desktops and laptops as well as non-OS devices such as VoIP phones, handhelds and network printers, without the need for a software agent of any kind.

"The Lehigh Valley Health deployment demonstrates, once again, that CounterACT over-delivers on its promise to ease deployment and deliver best-in-class network access control with built-in intrusion prevention," said Ray Wizbowski, vice president, ForeScout. "At ForeScout, we continue to exceed our customers' requirements, helping them buy into a NAC platform and strategy that fits their security requirements today, while giving them a cost-effective policy compliance platform they can rely on in the future."

CounterACT combines clientless network access control (NAC) and signatureless intrusion prevention to ensure all connected and connecting devices are in compliance with network security policies and are free of self-propagating threats. CounterACT seamlessly integrates into any network environment without requiring costly upgrades or infrastructure changes, and enables enterprises to tailor enforcement actions to match the level of policy violations, ensuring user disruption only occurs when it is warranted or required by the IT staff.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo