{"id":69309,"date":"2021-09-17T07:13:44","date_gmt":"2021-09-17T14:13:44","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/c2c-copy\/"},"modified":"2025-12-17T09:53:14","modified_gmt":"2025-12-17T14:53:14","slug":"civ","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/civ\/","title":{"rendered":"Securing Federal Civilian Agencies"},"content":{"rendered":"<h1>Securing Federal Civilian\u00a0Agencies<\/h1>\n<p>\u00a0<br \/>\n<a href=\"https:\/\/www.forescout.com\/resources\/forescout-as-the-foundation-of-your-agencys-it-ot-iot-zero-trust-strategy\/\" title=\"Read the Solution Brief\" class=\"c-btn c-btn--yellow has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">Read the Solution Brief<\/a><br \/>\n\u00a0\n\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Track incidents from alert to\u00a0resolution<\/h2>\n<p>Forescout\u2019s eyeExtend for Spunk enables sharing of device context that SOC analysts need for informed threat analysis and remediation. Focus resources on the most urgent security events and compress incident response time to curb cyber attack impact on operations.<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Identify and isolate high-risk\u00a0devices<\/h2>\n<p>Devices with unpatched or out of date software create risk. Forescout\u2019s eyeExtend for Tenable can trigger automatic security assessments the minute a device connects to your network. Move compliant devices to the production network and isolate high-risk devices until they become compliant with security policies. <\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Automate and simplify security\u00a0patching<\/h2>\n<p>Forescout compliments client management tools like HCL BigFix by checking that agents are installed, compliant, properly configured and communicating with its server to deliver the security intended.<\/p>\n<h2 class=\"c-title\">The Forescout 4D Platform<sup>\u2122<\/sup> can serve as the centerpiece of your CDM solution by helping\u00a0you:<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Mitigate vulnerabilities and quickly respond to incidents with automated, real-time visibility of endpoints as they connect to your network.<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Establish a real-time inventory of devices, hardware, operating systems, applications, patch levels, open ports, peripheral devices, users and more.<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Limit network access to authorized users and devices with or without 802.1X.<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Assess the security and compliance posture of endpoints in real time, both pre- and post-connection.<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Automate remediation of noncompliant endpoints by auto-updating endpoint configurations, patches and updates, and install, activate, or disabling applications or peripherals.<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Produce realtime compliance reports and shorten Detection Interval Latency by initiating compliance scans as hosts connect, rather than waiting for time-based scans.<\/h3>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Easily integrate custom applications, security tools and management systems with the Forescout 4D Platform<sup>\u2122<\/sup><\/h2>\n<p>Quickly build, consume and share integrations that connect the Forescout 4D Platform<sup>\u2122<\/sup> to many other technologies. Forescout\u2019s eyeExtend Connect allows you to incorporate Forescout 4D Platform<sup>\u2122<\/sup> data with your other security and information technology solutions, creating a single source of truth about all devices connected to your enterprise. <\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Proactively detect overexposed privileged accounts to reduce\u00a0risk <\/h2>\n<p>Forescout eyeExtend for CyberArk provides real-time, agentless visibility into undiscovered local privileged accounts. Automate responses to threats based on holistic visibility into user activity, device security posture, incident severity and overall threat exposure.<\/p>\n<h2 class=\"c-title\">Related Products<\/h2>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesight\/\" title=\"Learn More\" class=\"c-card\"><\/p>\n<h3 class=\"c-card__title\">eyeSight<\/h3>\n<p>Continuously discover, classify and assess devices upon connect without requiring agents or disrupting critical business operations.<\/p>\n<p>Learn More<\/a><a href=\"https:\/\/www.forescout.com\/products\/eyecontrol\/\" title=\"Learn More\" class=\"c-card\"><\/p>\n<h3 class=\"c-card__title\">eyeControl<\/h3>\n<p>Enforce and automate policy-based controls to proactively reduce your attack surface and rapidly respond to incidents.<\/p>\n<p>Learn More<\/a><a href=\"https:\/\/www.forescout.com\/products\/eyeextend\/\" title=\"Learn More\" class=\"c-card\"><\/p>\n<h3 class=\"c-card__title\">eyeExtend<\/h3>\n<p>Share information and automate workflows through integrations with other. <\/p>\n<p>Learn More<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing Federal Civilian\u00a0Agencies \u00a0 Read the Solution Brief \u00a0 Track incidents from alert to\u00a0resolution Forescout\u2019s eyeExtend for Spunk enables sharing of device context that SOC analysts need for informed threat analysis and remediation. Focus resources on the most urgent security events and compress incident response time to curb cyber attack impact on operations. Identify and [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":0,"parent":0,"menu_order":115,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-69309","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Federal Civilian Agencies - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/civ\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Federal Civilian Agencies - Forescout\" \/>\n<meta property=\"og:description\" content=\"Securing Federal Civilian\u00a0Agencies \u00a0 Read the Solution Brief \u00a0 Track incidents from alert to\u00a0resolution Forescout\u2019s eyeExtend for Spunk enables sharing of device context that SOC analysts need for informed threat analysis and remediation. Focus resources on the most urgent security events and compress incident response time to curb cyber attack impact on operations. Identify and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/civ\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T14:53:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/civ\/\",\"url\":\"https:\/\/www.forescout.com\/civ\/\",\"name\":\"Securing Federal Civilian Agencies - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/civ\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/civ\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"datePublished\":\"2021-09-17T14:13:44+00:00\",\"dateModified\":\"2025-12-17T14:53:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/civ\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/civ\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/civ\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\",\"width\":50,\"height\":34},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/civ\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Federal Civilian Agencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Federal Civilian Agencies - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/civ\/","og_locale":"en_US","og_type":"article","og_title":"Securing Federal Civilian Agencies - Forescout","og_description":"Securing Federal Civilian\u00a0Agencies \u00a0 Read the Solution Brief \u00a0 Track incidents from alert to\u00a0resolution Forescout\u2019s eyeExtend for Spunk enables sharing of device context that SOC analysts need for informed threat analysis and remediation. Focus resources on the most urgent security events and compress incident response time to curb cyber attack impact on operations. Identify and [&hellip;]","og_url":"https:\/\/www.forescout.com\/civ\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-12-17T14:53:14+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/civ\/","url":"https:\/\/www.forescout.com\/civ\/","name":"Securing Federal Civilian Agencies - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/civ\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/civ\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","datePublished":"2021-09-17T14:13:44+00:00","dateModified":"2025-12-17T14:53:14+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/civ\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/civ\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/civ\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg","width":50,"height":34},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/civ\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Securing Federal Civilian Agencies"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/69309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=69309"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/69309\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=69309"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=69309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}