Network Access Control (NAC) and intrusion prevention solutions provider ForeScout Technologies has joined the Trusted Computing Group (TCG).
TCG is a not-for-profit organisation formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies across multiple platforms, peripherals, and devices. TCG’s roster encompasses more than 135 companies worldwide including HP, IBM, Intel, Microsoft, Sony, and Sun Microsystems.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
"We are delighted to have ForeScout join as they bring such rich network security—and specifically Network Access Control - expertise to the Trusted Network Connect (TNC) efforts of the Trusted Computing Group," comments Brian Berger, chair, TCG marketing work group. Berger is confident that ForeScout will help the Group’s efforts to further accelerate the adoption of the open security specification and to provide interoperable solutions across product lines.
ForeScout’s best known NAC appliance, CounterACT, enables the enforcement of business policies by granting access to compliant users, while providing a full range of measured enforcement options for non-compliant and/or unauthorised users. This, say the company, is accomplished by integrating into the network and without the need for a client/agent on the endpoint, enabling the enforcement of security policies on all devices connected to the network. ForeScout adds that with a patented signature-less intrusion prevention engine built into the solution, the network is always protected from the most disruptive threat to network operations and user productivity: "zero-day" self-propagating malware.
"With the need for different levels of access for different types of employees and corporate visitors, organisations are faced with tremendous security challenges," says Ray Wizbowski, senior director of market development and communications. "Network access control solutions…are meeting those complex challenges for leading edge enterprises. Our membership in the Trusted Computing Group will allow us to share our expertise as we develop security standards and products that meet our customers" needs today and into the future."