ForeScout Updates IoT Visibility Platform

 ForeScout Technologies has updated its ForeScout CounterACT platform to version 8.

The enhanced ForeScout device visibility platform, available via channel partners, adds increased scalability, cloud-based device intelligence, IoT device assessment and flexible centralized licensing to help enterprises see and control more than five billion IP-connected devices, including traditional, mobile, virtual, IoT and operational technology (OT).

“The industry has a massive visibility problem that is only growing as the number of corporate un-managed IP-connected devices continues to explode. Enterprises can’t protect their networks if they don’t know what’s on their networks,” said Michael DeCesare, CEO and president, ForeScout Technologies. “The result of two years of engineering innovation, our enhanced device visibility platform represents a step forward and sets a foundation for the deep, scalable device visibility and control required to secure the new generation of enterprise networks.”

In the last year, organizations have had to keep pace with the rapid growth of devices while managing security hygiene and compliance. Companies are discovering up to 60 percent more devices on their network than previously known, according to Forrester, with an increasing majority that cannot support management and security agents. Threat actors have also begun to exploit the expanded attack surface represented by non-traditional IoT and OT devices as entry points into the enterprise.

“Instead of kicking the thousands of IoT [devices] off our network, which would impact business operations and productivity, ForeScout gives us complete visibility and control of these devices. During the outbreak of WannaCry, ForeScout detected, prioritized and automated patching, saving HubSpot’s security practitioners hours on manual processes to safeguard against ransomware infections,” said Nick Duda, principal security engineer, HubSpot. “Since we can’t trust the system integrator to implement our device configuration best practices, we use ForeScout policies to inspect their security posture and automate risk mitigation actions if they are non-compliant.”