Forescout

ForeScout

Do you have a problem like this?

  • I don't know where to start even if I say security measures for OT and IoT
  • The company's assets are not properly understood, and the lack of knowledge makes it difficult to know what measures to take.
  • It is managed with a management ledger, but I am worried about whether the contents match the actual assets
  • Due to the presence of various IT/OT/IoT devices and different administrators, comprehensive management is not possible

What is Device Assessment Service?

The analysis equipment installed in the customer environment acquires and visualizes communication information from the mirror port of the device list information (PC, server, switch, PLC, etc.) existing in the IT/OT/IoT environment, and considers their security risks. Service that provides reports.

This makes it possible to understand all devices even in complex environments where IT/OT/IoT coexist. In addition, a unique report that utilizes the security knowledge that Macnica has accumulated through supporting many manufacturing customers will clarify the measures that should be implemented on a priority basis.

Service usage flow

Service usage flow

Installation image of analyzer

Installation image of analyzer

Service details

  • Implementation content
    • Acquire terminal list information based on mirror port communication
      Target mirror port: 1 port (1 place)
      Supported throughput: 1Gbps
    • Switch/wireless integration enables detection and location of devices with no traffic
      Maximum number of target switches: 100 units
    • Maximum number of devices to be visualized: 5000
    • Detection of patch application status by WMI is also possible
      HW (1U or 2U server) with customer environment settings *) to the mirror port
      *VM version is also available
      *We cannot accept requests for equipment.
  • Work period: about 1.5 months
  • Deliverables:
    • csv file of the visualized terminal list (this will be the device standard output file)
    • Report on device visualization results and suggestions for future actions
      *We cannot accept requests for items and formats included in reports and CSV files.

Device vulnerability assessment service (optional)

  • Implementation content
    • Obtain traffic information based on mirror port communication
      Target mirror port: 1 port (1 place)
      Supported throughput: 1Gbps
      Connect the HW (1U server) with the settings of the customer environment to the mirror port
      *VM version is also available
  • Work period:
    • 1.5 months
  • Deliverables:
    • Reports on device vulnerabilities, network visualization results, security risks, and suggestions for future actions
      *We cannot accept requests to specify the items to be included in the report and the format.

Report image

Report image
Report image

If you have any questions or would like to apply for this service,
Please feel free to contact us from the following.