You are on page 1of 2

PALO ALTO NETWORKS: Technology Partner Solution Brief

ForeScout CounterACT Integration with


Palo Alto Networks® Next-Generation Firewall
Technology Segment: Authentication and Access Control

The Palo Alto Networks Technology SOLUTION OVERVIEW

Partner Program includes a select ForeScout has partnered with Palo Alto Networks to deliver a
group of partners that deliver solutions powerful solution that augments the capabilities of your next
generation firewalls with real-time user-to-device mapping and
or products that interoperate with the
device security posture from ForeScout CounterACT. With this join
next-generation firewall.
solution, you gain superior visibility into corporate and personal
HIGHLIGHTS devices on the network, thereby allowing you to enforce firewall
policies and application access based on user identity and device
■ Eliminate Blind Spots
Obtain real-time intelligence about the devices and security posture.
users on your network, including BYOD, guest and
unmanaged endpoints, without the need for agents. ForeScout CounterACT and Palo Alto Networks next-generation firewalls work
together to leverage the best-of-breed capabilities of each solution. The joint solution
■ Enforce User-aware Application Access
delivers real-time visibility of the devices on your network, user-aware access controls
Create and enforce next-generation firewall policies
and compliance monitoring and mitigation of endpoint security risks.
based on real-time user identity information, regardless
of which device, IP address or location the user connects
ForeScout CounterACT is a pervasive network security platform that delivers
from.
real-time intelligence and policy-based controls for users and devices connected to
■ Enhance Network Security your network—managed and unmanaged, wired and wireless, corporate and personal,
Incorporate contextual information such as device PCs and handhelds. Combining CounterACT with your next-generation firewalls, you
security posture into your next generation firewall gain unique capabilities such as:
policies to protect your network from non-compliant
or unsanctioned devices. • Real-time intelligence about the entities on your network devices, users,
■ Enable Continuous Monitoring and Mitigation
operating systems and applications, including mobile and unmanaged
Reduce enterprise risk by ensuring that endpoints
endpoints. CounterACT incorporates one of the most granular host
have up-to-date security defenses. Continuously
interrogation engines in the industry to gather detailed configuration
monitor and mitigate security gaps on endpoints
information about endpoints, without needing agents. It creates a detailed
connecting to your network.
catalog of connected users and devices, eliminating blind spots.
• CounterACT provides real-time user-to-device mapping information to your
next generation firewalls—for corporate and personal devices. CounterACT
detects devices as soon as they connect to the network and obtains username
information during the network access process. It communicates the user
login information to your next-generation firewalls. This allows you to
manage USER-ID policies in your next generation firewall based on user
identity, regardless of device type, IP address or location. Your firewall can
provision different levels of access based on users and groups, and it can
restrict specific users from certain parts of your network.
PALO ALTO NETWORKS: Technology Partner Solution Brief

• ForeScout CounterACT can ensure that endpoints on


your network are compliant with your security policies.
CounterACT can automatically fix most endpoint
compliance deficiencies, for example by updating
antimalware, prompting the patch management system to
update the device’s operating system, disabling unsanctioned
applications and enabling required applications. CounterACT
can also check for the presence and activity of endpoint
security agents and can dynamically install, enable or
configure the agents according to your security policy.
CounterACT physical or virtual appliances deploy out-of-band,
thereby adding no latency or potential for network failure.
CounterACT interoperates with your existing network
infrastructure and is vendor-agnostic. It provides real-time
visibility of devices and users as they connect to your network,
without the need for agents.

• When a device disconnects from the network, CounterACT About ForeScout


provides real-time user logoff information to your next- ForeScout delivers pervasive network security by allowing
generation firewalls. This makes your next-generation firewalls organizations to continuously monitor and mitigate security
aware of which devices and users have disconnected from your exposures and cyber attacks. The company’s CounterACT
network and eliminates the risk of device piggybacking. appliance dynamically identifies and assesses network users,
• CounterACT provides real-time device security posture and endpoints and applications to provide visibility, intelligence
to your next generation firewalls. CounterACT can add non- and policy-based mitigation of security issues. ForeScout’s open
compliant devices to dynamic address groups in your next- ControlFabric technology allows a broad range of IT security
generation firewalls. By incorporating endpoint compliance products and management systems to share information and
information into your firewall security policies, you can block automate remediation actions. Because ForeScout’s solutions are
or restrict non-compliant devices from parts of your network. easy to deploy, unobtrusive, flexible and scalable, they have been
chosen by more than 1,500 enterprises and government agencies.
Headquartered in Campbell, California, ForeScout offers its
solutions through its network of authorized partners worldwide.
Learn more at www.forescout.com.

About Palo Alto Networks


We are leading a new era in security by protecting thousands
of enterprise, government, and service provider networks from
cyber threats with our game-changing security platform that
natively brings together all key network security functions,
including a next-generation firewall, URL filtering, IDS/IPS, and
advanced threat protection. Because these functions are purposely
built into the platform from the ground up and they natively
share important information across the respective disciplines, we
ensure better security than legacy firewalls, UTMs, or point threat
detection products. With our platform, organizations can safely
enable the use of all applications critical to running their business,
maintain complete visibility and control, confidently pursue new
technology initiatives, and protect the organization from the most
basic to the most sophisticated cyber attacks—known and
unknown. Learn more at www.paloaltonetworks.com.

4401 Great America Parkway Copyright ©2014, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks,
Santa Clara, CA 95054 the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of
Palo Alto Networks, Inc. All specifications are subject to change without notice.
Main: +1.408.753.4000
Palo Alto Networks assumes no responsibility for any inaccuracies in this document
Sales: +1.866.320.4788
or for any obligation to update information in this document. Palo Alto Networks
Support: +1.866.898.9087 reserves the right to change, modify, transfer, or otherwise revise this publication
www.paloaltonetworks.com without notice. PAN_TPSB_NGFW_ForeSource_101414

You might also like