|Page (1) of 1 - 06/26/12||email article||print page|
International Rectifier Enforces Access and Endpoint Security Policies With ForeScout CounterACT Network Access Control(June 26, 2012)
CUPERTINO, CA -- (Marketwire) -- 06/26/12 -- ForeScout Technologies, Inc., a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations, today announced that International Rectifier has selected ForeScout CounterACT to enforce access and endpoint security policies. International Rectifier joins the expanding list of customers who have replaced their earlier generation network access control (NAC) solution with ForeScout CounterACT to gain real-time visibility and automated control.
Headquartered in El Segundo, California and employing 4,500 people worldwide, International Rectifier is the worldwide leader in advanced power management technology. Like other IT organizations, International Rectifier was concerned about protecting access to resources and sensitive data on their distributed network spanning 35 offices in 20 countries.
After extensively evaluating and benchmarking the leading NAC vendors, International Rectifier selected ForeScout, which was more integrated; easier to use, implement and manage; and did not adversely affect user experience. The company was able to quickly deploy multiple CounterACT appliances and centrally manage all 8,500 devices across multiple office locations from one console and without changing their existing infrastructure. Now, the company seamlessly manages known users and their devices, as well as identifies guests and unauthorized computers and dynamically directs them to a separate, Internet-only VLAN.
"We are very impressed with ForeScout CounterACT's user interface and ease of implementation," said James Tu, director of information security for International Rectifier. "We deployed CounterACT in less than three weeks including installation, network integration, training and production startup. The system is so well designed that I was able to configure it myself and write my own rules, for example to check for endpoint compliance with regards to antivirus and OS patching. ForeScout immediately delivered value beyond the guest network access by providing information about the security vulnerabilities of known devices and identifying unknown ones."
Another important advantage is that CounterACT's multi-factor visibility into connected devices, flexible policy management and continual endpoint monitoring enabled International Rectifier to employ a post-connect compliance model. For example, when employees or guests connect their personal devices to the network, the devices are automatically identified by CounterACT and isolated onto a guest network. At that point, CounterACT quickly checks compliance and enforces endpoint security policies; however, the user at least has limited network access. This results in a better user experience for both employees and guests, and the rapid and flexible policy assessment puts less strain on the IT department.
"What surprised us the most was the amount of network visibility that ForeScout CounterACT gave us," said Tu. "From a single location we can see all our network switches and IP ranges globally, and can readily tell which switch and which port connects to a particular host and various configuration details. This is tremendous because it's visibility that we didn't have before."
Other advantages important to International Rectifier include:
- Offers faster, easier and more assured deployment; does not require agents nor changes to the existing architecture
- Fortifies security by identifying users and devices in real-time and preventing guests, unauthorized users, rogue devices and insecure endpoints from accessing the network
- Assures endpoint security compliance across client operating systems, antivirus programs and other host-based security countermeasures with means for self- and automated remediation
- Centralizes access and endpoint security monitoring and incident response; one console can see and manage up to 400,000 endpoints across distributed sites
ForeScout was recently recognized by SC Magazine's 2012 Reader Trust Award and the Network Solutions Guide award as the company with the Best Network Access Control (NAC) product. Frost & Sullivan also identified ForeScout as the largest independent NAC vendor and one that is growing the fastest among market leaders.(1) To obtain an abridged copy of Frost & Sullivan 2012 NAC market analysis, visit www.forescout.com/frost2012.
About ForeScout Technologies, Inc.
ForeScout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security. ForeScout's automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs. Because the ForeScout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world's most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.
(1) Frost & Sullivan, Analysis of the Network Access Control Market, Report NAD5-01, by Chris Rodriguez, March 2012. The full report is available at www.frost.com/nad5.
ForeScout Technologies, Inc. is a privately held Delaware corporation. ForeScout, the ForeScout logo, CounterACT and ActiveResponse are trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners.
Montner & Associates, Tech PR
Copyright @ Marketwire
Related Keywords: network access control, control network access, access control, network security, mobile security, Security, Computer Technology, Business Issues, Mobile Devices, Management, Marketwire, Inc., IT (Information Technology), Security, Appliances, Environmental Technology, Computer Science, Other,