Home > Articles > ForeScout CounterACT 5.1

ForeScout CounterACT 5.1

January 30th, 2006

ForeScout has announced the availability of CounterACT 5.1. The new version enhances CounterACT´s ability to detect and disable rogue wireless access points deployed at any location on an enterprise network over the wire, eliminating an increasingly common vulnerability in enterprise networks. CounterACT ensures that unknown devices and endpoints that are non-compliant with the network security policies cannot gain access to critical infrastructure or sensitive information assets.

CounterACT is a network security device that provides clientless network access control NAC and Intelligent Intrusion Prevention by monitoring traffic entering and exiting the protected network segment. Once a network policy violation, self-propagating malware, or an intelligent hacker has been identified, CounterACT can automatically restrict or deny access to the network, block the threat or suppress propagation.

CounterACTs can be deployed across an enterprise and share security alters and policy violations, creating a uniform layer of security across all network segments.

“With seamless integration to 95% of the switches in use today, there is no need to ´rip and replace´ existing equipment. Adding the ability to detect and shut down rogue wireless access points is yet another example of our commitment to customers to protect against all attack sources, “said T. Kent Elliott, CEO of ForeScout Technologies.

Version 5.1 of ForeScout’s CounterACT bolstering the product’s rouge wireless detection engine and adding 802.1x integation. ForeScout added additional security features such as self-remediation system and enables in-depth interrogation of unknown endpoints.

The rogue wireless detection engine can detect and disable a rogue wireless access point deployed at any location on the network without the need for additional RF equipment. The self-remediation system deploys PatchLink remediation system to ensure that users can immediately self-correct issues that may be preventing their access to the network without IT intervention.

“As employees and contractors increasingly access critical information assets via both internal, wireless, and VPN connections, ensuring each device is properly authorized is a nightmare,” says Mike Rothman, President and Principal Analyst of Security Incite. “Network Access Control is a promising technology to simplify the enforcement of access and authorization policies, but winning solutions must integrate transparently into the existing infrastructure and not adversely impact the user experience.”

Articles

Comments are closed.