infoTECH Feature

August 12, 2014

Bremer Financial Corporation Installs ForeScout CounterACT

Network environments are continuously under threat from internal and external sources. Whether it is a massive DDoS attack launched by hacktivists or a rogue app installed on the mobile device of an employee who is part of the corporate bring your own device (BYOD) program, the danger is very real and unrelenting.

In order to keep track of what is taking place on the network at all times, it requires a platform that provides real-time visibility of the devices, applications and users that are connected. ForeScout Technologies, provider of pervasive network security solutions, delivers such visibility with its CounterACT solution.

Recently, Bremer Financial Corporation, a privately held, $8.7 billion regional financial services company, has turned to ForeScout CounterACT, to manage an assorted range of corporate and user-owned devices.

Joseph Thornell, security technical architect at Bremer Bank said that they required a fluid, secure method to identify corporate assets and secure access for personal and guest devices at the same time. “ForeScout fit the bill, and we chose it almost immediately," Thornell added.

The new deployment is helping Bremer to manage its devices along with additional access points for guests and employee mobile devices. The bank is also using CounterACT to stop non-corporate and threatening devices from achieving network access to its sensitive IT resources.

Apart from that, Bremer is relying on CounterACT to build custom security policies through its organization as well as apply its BYOD and mobile security policies by identifying, limiting or blocking unauthorized applications.

The bank has been able to integrate CounterACT with its IBM (News - Alert) Security QRadar Security Information Event Management (SIEM) solution to further mitigate security issues. This was made possible using ForeScout's ControlFabric technology.

Thornell further added, "ForeScout CounterACT delivered as soon as we plugged it in. The ability to see and manage over 4,000 endpoints, as well as the ability to integrate with other security solutions is instrumental. We look forward to seeing continued benefits from our deployment."




Edited by Maurice Nagle
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers