Page 16 - FCW, September/October 2019
P. 16

Cybersecurity and Modernization
Don’t miss
the endpoint
When it comes to federal network security, agencies must keep an eye on the proliferation of endpoints
Katherine Gronberg
Vice President of Government Affairs, Forescout Technologies Inc.
Detecting nontraditional network devices
Most organizations struggle to detect nontraditional endpoints. IoT devices, PIT systems and many user support devices cannot run management software, as computers do, that allows them to be detected on the network and assessed
for their security. Because IoT and PIT endpoints cannot support the installation
of software (in industry speak, an “agent”) on them, most security products such
as antivirus or patching tools miss them completely. This is analogous to a class chaperone who stands on the bus and asks: “Is everyone here?” To secure nontraditional endpoints, another approach is required — one that is not dependent on software being deployed on an endpoint.
This was the approach taken by the Department of Homeland Security when it created the Continuous Diagnostics and Mitigation program. CDM’s purpose is to enable agencies to identify cybersecurity risks on an ongoing basis, prioritize these risks and mitigate the most significant problems first. The Defense Department is currently implementing a similar program called Comply to Connect (C2C). Both programs depend on agentless asset detection technology to achieve full visibility of the enterprise.
When the federal civilian agencies deployed the CDM toolset using the Forescout platform as the hardware detection tool, they discovered an average of 75 percent more devices on their networks than they previously knew existed, according to CDM Program Manager Kevin Cox.
In Forescout’s experience, this visibility
THE ADAGE, “KNOWING
you have a problem is the first step
toward recovery,” is applicable to the challenge presented by a diverse and growing array of endpoints connecting to government information systems. What are these endpoints? Why are agencies connecting them to their IT networks? And perhaps most important: What cybersecurity threats do these endpoints pose?
An endpoint is any physical or virtual device that transmits data that connects
to an IT network. An endpoint can
be a traditional IT device — such as a computer, server, smartphone or tablet — or a peripheral device, such as a printer. Increasingly, however, endpoints consist of
consumer internet of things (IoT) devices or networked mission-supporting devices such as building automation systems, industrial control systems, engines and even weapon systems.
Such nontraditional devices process data, can be easily deployed and typically have limited functionality. In 2018, U.S. Cyber Command defined six categories of endpoints: mobile devices; workstations and servers; networked user support devices; network infrastructure; IoT; and platform information technology (PIT). Much like in the consumer sector, government agencies are connecting these devices because they increase efficiency and safety and enhance mission effectiveness and delivery of services.
davooda/Shutterstock/FCW Staff
S-16 SPONSORED CONTENT











































































   14   15   16   17   18