Page 17 - FCW, September/October 2019
P. 17

Learn more at Carah.io/Cyber-Forescout
To secure nontraditional endpoints, another approach is required — one that is not dependent on software being deployed
on an endpoint.
gap — the devices agencies can’t detect — is predominantly attributable to nontraditional endpoints, which are simply proliferating faster in agencies’ environments.
Closing the visibility gap
Being blind to so many endpoints in your network environment creates serious risk. You cannot secure the endpoints you cannot detect. Further, because these devices frequently
support physical missions, failure to secure them can have operational consequences, including disruption of the mission. All organizations must have the right tools to expose and close the visibility gap created by unknown, nontraditional endpoints.
In securing federal systems, we must transition from old ways of thinking. We must resist the urge to be that wishful class-trip chaperone. With programs like
CDM and C2C, the U.S. government has made a strong statement that the future of federal network security hinges on continuous and automated detection and assessment of all endpoints. To do otherwise would be missing the point.
Katherine Gronberg is vice president of government affairs at Forescout Technologies Inc.

Security Platform
Across Your Extended Enterprise
Campus IoT Data Center Cloud OT
www.Forescout.com
The Leader in Device Visibility and Control
SPONSORED CONTENT S-17


















































































   15   16   17   18   19