Our Forescout Certified Engineers (FSCE) have years of integration and support experience, and have completed hundreds of successful deployments. We provide you with the technical expertise required for an expedited Forescout deployment. ACES FSCE’s effectively deploy initial configurations to quickly achieve the highly coveted agentless visibility, passive discovery and profiling of connected devices. Visibility extends into not only End User Device (EUD’s) but Operational Technologies (OT) such as Office Automation (OA), IPv6 addressable devices and devices managed by cloud-based platforms.
ACES FSCE’s provide the next steps into visibility and compliance by configuring the more advanced plugins and modules.
Gain additional visibility by adding plugins and pull information from existing sources such as Microsoft System Center Configuration Manager (SCCM), VMware, VPN and wireless infrastructure. This further enriches not only the hosts profile properties but allows for more robust policies, helps identify compliance, and provides additional datapoints gathered by other network services infrastructure.
Forescout modules are a valuable component of the security orchestration capabilities enacted by the platform. Modules allow for bi-directional communication of data between the connected security tools into a singular platform with the ability to take automated responses. ACES configuration and testing of these modules not only taps into the data contained in what are normally disconnected information silos but further leverages the data in orchestrating automated responses.
Policy creation, accuracy, and flow are key to a successful deployment. ACES FSCE’s scope a concise policy set that identifies assets; ascertains true corporate device ownership; forwards end devices to enterprise compliance checks catalogs software information, identifies versioning and device configurations; and brings it together in a holistic dashboard. ACES FSCE’s assist in the creation of automation policies for other disparate solutions performing log analysis, inventory, reporting, alerting, ticketing, and craft remediation steps for non-compliant or faulty systems throughout your enterprise.
We can deploy the solution in a manner that suites your company’s needs: on-site, with ACES employees traveling to your location(s), or our trained professionals have experience successfully managing deployments remotely.
Advanced Services & Custom Integrations
Beyond initial deployments, ACES can help customize the solution for the customer environment, whether that’s through custom policies and workflow management or 3rd party tool integrations.
ACES provides customers with integration models that enhance individual product capabilities. This allows the customer to take full advantage of the features from each unique tool in their environment and eliminating the need to replace existing tools, combining capabilities and ensuring the right tools are used in the right situation.
ACES engineers have successfully integrated 3rd party vendor products, and created automated workflows, from vendors such as McAfee, FireEye, Tenable, ServiceNOW and many others.