sb-eu logo
Story image

Forescout and Arista Networks embark on new Zero Trust security partnership venture

Forescout and Arista Networks have come together to deliver Zero Trust security and greater device visibility and enforcement across heterogeneous networks.

The strategic partnership includes the development of an open ecosystem that embeds security within the network fabric and delivers full visibility and enforcement of critical enterprise assets.

Through this new collaboration, Forescout integrates directly to and is certified on Arista’s switches and wireless infrastructure, including the new line of Arista Cognitive Campus PoE switches.

Forescout also supports Arista’s network-wide workload orchestration and workflow automation solution CloudVision.

Further, co-innovation is underway in the context of a Zero Trust architecture to identify IoT devices and ensure they are assigned to specific segments to reduce risk and prevent anomalous behaviour, the companies state.

With the proliferation of IoT devices, the need for Zero Trust security is increasingly critical to contain outbreaks and control access, the companies state.

The integration of Forescout’s device visibility and control platform with Arista’s software-defined networking (SDN) architecture will address these challenges at enterprise scale and deliver complete visibility, threat detection, and dynamic segmentation.

Forescout chief product and strategy officer Pedro Abreu says, “Forescout and Arista are transforming network security with policy-driven segmentation and least privilege access across Arista and heterogeneous environments without proprietary vendor lock-in.

“This is a natural and organic partnership where, together, we will provide Zero Trust security and compliance from device to network with visibility, analytics and automation.”

Arista Networks chief operating officer Anshul Sadana says, “Forescout has proven holistic device visibility and control in today’s dynamic IoT environments in multivendor networks.

“Network speed and resilience need the active security defence that Forescout’s agentless solution provides.”

IDC research director of security & trust Robyn Westervelt says, “The exponential growth and diversity of non-traditional devices on enterprise networks has drastically increased the attack surface.

“While these devices provide rich data, improve productivity, and create new services, cyber criminals are exploiting them as an entryway to deploy ransomware attacks and other threats that can have a severe impact on operations.

“We see access enforcement and network segmentation as critical defences to manage IoT security risk.”

Customers can now benefit from the partnership and technology integration.

Forescout Technologies delivers device visibility and control to enable enterprises and government agencies to gain complete situational awareness of their environment and orchestrate action.

Arista Networks specialises in software-driven cloud networking solutions for large data centre and campus environments, to reduce cybersecurity risks brought on by explosive growth of Internet of Things (IoT) devices, increased network complexity and propagation of malware.

Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
How security awareness training can safeguard companies from cyber-attacks
Training goes a long way in embedding a culture of cybersecurity compliance within the company.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More