Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Damballa and ForeScout Partner on Threat Protection

Damballa, a provider of threat protection and containment solutions, and ForeScout Technologies, a provider of network security solutions, have teamed up in an effort to enhance visibility and automate remediation of advanced threats within enterprise networks.

Damballa, a provider of threat protection and containment solutions, and ForeScout Technologies, a provider of network security solutions, have teamed up in an effort to enhance visibility and automate remediation of advanced threats within enterprise networks.

By identifying evidence of malicious network traffic in real time, Damballa Failsafe helps discover and validate successful infections, giving incident responders the ability to pinpoint compromised devices and quickly mitigate risk.

As part of ForeScout’s ControlFabric Technology Partner Program, which allows IT security products and management systems to share information and automate remediation actions, Damballa Failsafe is now integrated with ForeScout CounterACT, enabling customers to automatically quarantine or log devices deemed ‘infected’ by Damballa.

CounterACT receives the malware details from Damballa Failsafe and allows enterprises to take actions based on triggered policies, which can quarantine infected endpoints, isolate the communications channels of breached systems, block the infection source or automatically install hot patches as needed on endpoints, according to the announcement.

“ForeScout‘s ControlFabric provides an open approach to integrate with CounterACT and deliver additional intelligence and policy coordination necessary to advance endpoint protection, continuous monitoring and mitigation capabilities,” said Paul Rolfe, vice president of alliances at Damballa. “We are delighted to partner with ForeScout as the value of the Damballa and ForeScout interoperability helps enterprises enhance incident response efficiency and minimize business risk from advanced threats.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...