Cyber security leader Forescout collaborating with Smart Data arranged a seminar on Thursday (29 February) where CISO, CTO, COO and IT professionals from the industry joined in a hotel at Dhaka.
Forescout Technologies, Inc. is a global leader in cybersecurity. It identifies, protect, and ensure compliance of all cyber assets, whether managed or unmanaged, including IT, IoT, IoMT, and OT. It delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables customers to more effectively manage cyber risk and mitigate threats.
Renowned cybersecurity researcher Jeremiah Fowler uncovered a non-password-protected database having over 1.1 million records linked to Conduitor Limited (Forces Penpals)....
"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
On the seminar Naushad Alam, Regional Manager (South India, Sri Lanka, Bangladesh) said, For various reasons Bangladesh has become a blooming market specially in cyber industry. Last few years, Much infrastructure have been set up and many gov.t and private services also has been digitized.
Bangladesh has cyber potential market which catches attention internationally. So, Forescout plans its presence to Bangladesh with its comprehensive capabilities for network security, risk and exposure management, and extended detection and response.
He said, Bangladesh has a growing economy with a lot of potential having over 60 banks, which is significant. As a global company, Forescout aims to bring advanced security to this growing market, which is why we are also focusing more on Bangladesh.
Arun Prasad, System Eng. (India & SARRC) explained the technical issues how Forescout products are specially different from others. He said, when others are to maintain only the managed devices, Forescout managed with unmanaged and un agentable devices like broken endpoin agents, Out of date security update, Missing OS and applications patches and unauthorized applications. At end of the seminar the speaker answered the questions of the participants.