Professional Documents
Culture Documents
Partner Program includes a select ForeScout has partnered with Palo Alto Networks to deliver a
group of partners that deliver solutions powerful solution that augments the capabilities of your next
generation firewalls with real-time user-to-device mapping and
or products that interoperate with the
device security posture from ForeScout CounterACT. With this join
next-generation firewall.
solution, you gain superior visibility into corporate and personal
HIGHLIGHTS devices on the network, thereby allowing you to enforce firewall
policies and application access based on user identity and device
■ Eliminate Blind Spots
Obtain real-time intelligence about the devices and security posture.
users on your network, including BYOD, guest and
unmanaged endpoints, without the need for agents. ForeScout CounterACT and Palo Alto Networks next-generation firewalls work
together to leverage the best-of-breed capabilities of each solution. The joint solution
■ Enforce User-aware Application Access
delivers real-time visibility of the devices on your network, user-aware access controls
Create and enforce next-generation firewall policies
and compliance monitoring and mitigation of endpoint security risks.
based on real-time user identity information, regardless
of which device, IP address or location the user connects
ForeScout CounterACT is a pervasive network security platform that delivers
from.
real-time intelligence and policy-based controls for users and devices connected to
■ Enhance Network Security your network—managed and unmanaged, wired and wireless, corporate and personal,
Incorporate contextual information such as device PCs and handhelds. Combining CounterACT with your next-generation firewalls, you
security posture into your next generation firewall gain unique capabilities such as:
policies to protect your network from non-compliant
or unsanctioned devices. • Real-time intelligence about the entities on your network devices, users,
■ Enable Continuous Monitoring and Mitigation
operating systems and applications, including mobile and unmanaged
Reduce enterprise risk by ensuring that endpoints
endpoints. CounterACT incorporates one of the most granular host
have up-to-date security defenses. Continuously
interrogation engines in the industry to gather detailed configuration
monitor and mitigate security gaps on endpoints
information about endpoints, without needing agents. It creates a detailed
connecting to your network.
catalog of connected users and devices, eliminating blind spots.
• CounterACT provides real-time user-to-device mapping information to your
next generation firewalls—for corporate and personal devices. CounterACT
detects devices as soon as they connect to the network and obtains username
information during the network access process. It communicates the user
login information to your next-generation firewalls. This allows you to
manage USER-ID policies in your next generation firewall based on user
identity, regardless of device type, IP address or location. Your firewall can
provision different levels of access based on users and groups, and it can
restrict specific users from certain parts of your network.
PALO ALTO NETWORKS: Technology Partner Solution Brief
4401 Great America Parkway Copyright ©2014, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks,
Santa Clara, CA 95054 the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of
Palo Alto Networks, Inc. All specifications are subject to change without notice.
Main: +1.408.753.4000
Palo Alto Networks assumes no responsibility for any inaccuracies in this document
Sales: +1.866.320.4788
or for any obligation to update information in this document. Palo Alto Networks
Support: +1.866.898.9087 reserves the right to change, modify, transfer, or otherwise revise this publication
www.paloaltonetworks.com without notice. PAN_TPSB_NGFW_ForeSource_101414