Live Demos from the Forescout European Engineering Team.


Join us weekly for live 20 mins demos

Register for Live Demo

Details

Time:
  • 12:30-12:50 BST / GTM (20 mins)
  • 13:30-13:50 CEST/ CET (20 mins)
  • 15:30-15:50 EEST/ EET (20 mins)
Dates:
  • Fri 18 Aug (Network Security)
  • Fri 25 Aug (REM)
  • Fri 1 Sept (TD&R)
  • Fri 8 Sept (OT security)
  • Fri 15 Sept (Network Security)
  • Fri 22 Sept (REM)
  • Fri 29 Sept (TD&R)
  • Fri 6 Oct (OT security)
  • Fri 13 Oct (Network Security)
  • Fri 20 Oct (REM)
  • Fri 27 Oct TD&R)
  • Fri 3 Nov (OT security)
  • Fri 10 Nov (Network Security)
  • Fri 17 Nov (REM)
  • Fri 24 Nov (TD&R)
  • Fri 1 Dec (OT security)
  • Fri 8 Dec (Network Security)
Where:
Virtual

Hosts:
European Engineering Team

Contact Us:
Chris Hepple
European Marketing
[email protected]

Demo Overview

Network Security
Network Security
Discover, assess and enforce the compliance of all connected assets to ensure network security.
Demo highlights:
  • Hybrid platform for modern on-premise / cloud environments.
  • Continuously discover and classify all physical and virtual devices connected to your network without agents and scans.
  • Assess the security posture of all connected devices and priorities fixes.
  • Report real-time hardware and software asset inventory audits.
  • Continuously assess if networked devices are running up-to-date security software.
  • Limit access to employees when they are of out of compliance.
  • Set policies to automate the controls of vulnerable hosts, unpatched assets or infected systems.
  • Assess devices and restrict, block or quarantine noncompliant systems.
  • Segment access based on device type and security posture to reduce the risks posed by rogue devices or noncompliance.
Risk and Exposure Management
Risk and Exposure Management
Enhance your network security posture with risk-based prioritization.
Demo highlights:
  • Cloud platform with modern asset view.
  • Maintain a persistent asset inventory that tracks device-status-over-time.
  • Quantification of risk from configuration, function, and behavior.
  • Using risk and exposure attributes to design security policies and remediation workflows.
  • How to leverage risk-based prioritization for incident response.
Threat Detection & Response
Threat Detection & Response
Improve Your SOC Efficiency by 450x with better Detection and Response of true threats
Demo highlights:
  • Intuitive UI designed for SOC analysts
  • MITRE ATT® integration
  • Easy to add data sources
  • Automated data enrichment (IP geolocation, user and asset information).
  • Two-stage threat detection engine applies a blend of five detection techniques
  • Tiered storage (Hot, Warm, Cold) with rapid full-text search
  • Comprehensive detection rules with intuitive custom rules creation
  • Pre-configured, customizable, persona-based dashboards
  • Case management integration with 3rd party solutions
  • Integration with other Forescout solutions
OT Security
OT Security
Reduce operational and security risk in OT/ICS and SCADA environments
Demo highlights:
  • Passive monitoring and DPI of 250+ OT, IoT and IT protocols for in-depth monitoring and non-intrusive OT/ICS vulnerability identification.
  • Active endpoint discovery specific to OT/ICS inventory, audit, and compliance requirements.
  • Integration with network infrastructure to identify assets the moment they connect to the network.
  • Automated OT asset information and configuration change logs for security analysis and compliance reporting.
  • Real-time detection and controls providing guardrails for misconfigurations or operational errors.
  • Intuitive compliance reporting for key standards NERC CIP, EU NIS Directive, NIST CSF and IEC 62443.
  • NAC applied to contractor or remote employees, checking their security posture before granting access to the network and critical assets.
  • Information-sharing across IT and security products, including ITSMs, SIEMs, firewalls, authentication servers, for better situational awareness.