Wednesday 21st January 2015
Reading, Berks, UK, January 2015: Bytes Security Partnerships, today announced it has teamed with ForeScout Technologies, Inc, a market-leader in Network Access Control and Network Visibility security solutions for Global enterprises and government organizations, to enable Bytes customers to benefit from full visibility, control and mitigation for devices, users, systems and applications attempting to connect to their enterprise network. Bytes are seeing a real appetite within their customer base for a dedicated Network Access Control solution which is easily integrated into their existing infrastructure with the minimum of deployment complexity.
Forescout, as a Gartner Market Leader in Network Access Control with integration partnerships with 60+ technologies and offering clientless NAC solutions, was the obvious choice. "Having completed a market review of the technologies in the Network Access Control and Visibility space, we are delighted to announce the addition of Forescout to our vendor portfolio. We pride ourselves on working with best of breed security technologies across a wide spectrum of infrastructure needs.
Working with Forescout will enable us to ensure our customers have the network visibility, control and management they require to deal with today's advanced threats. Forescout is a not only a highly regarded market leader in NAC but also is a complementary technology to many of the core vendors our customers deploy. As such we are excited to present this to our customers to plug visibility gaps in their infrastructure"
David Rawle, Technical and Managing Director, Bytes Security Partnerships
What is Forescout CounterACT?
A network security platform that delivers visibility, control and mitigation for devices, users, systems and applications attempting to connect to an enterprise network - wired or wireless, managed or unmanaged, PC or mobile. It combines discovery, endpoint intelligence, access control, mobile security and policy-based mitigation in an integrated appliance that does not require agents, infrastructure upgrades or disrupt users.
As a result, IT staff can easily resolve security control gaps, such as personal mobile devices, unpatched and vulnerable systems or missing or inactive endpoint software, and remediate issues with little or no IT intervention. The platform uniquely offers a broad range of interoperability with popular network, mobile, security and management solutions.
Want to keep informed? Sign up to our Newsletter