{"id":79091,"date":"2023-06-27T08:00:37","date_gmt":"2023-06-27T15:00:37","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=79091"},"modified":"2023-06-27T10:13:10","modified_gmt":"2023-06-27T17:13:10","slug":"5-steps-to-combating-emerging-threats-with-network-security","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/","title":{"rendered":"5 Steps to Combating Emerging Threats with Network Security"},"content":{"rendered":"<p>In today\u2019s rapidly evolving threat landscape, cybercriminals have become <a href=\"\/research-labs\/2022-threat-roundup\/\">more sophisticated than ever<\/a>, making it crucial to stay abreast of the latest trends and tactics. The challenge is exacerbated by the expanding attack surface as more devices and device types connect to enterprise networks: IT, OT, IoT and IoMT devices, all with known vulnerabilities that can be exploited. Managing this growing attack surface requires adopting measures like passive asset discovery, risk-based vulnerability prioritization and zero trust network segmentation, to name a few.<\/p>\n<p>Recently, we\u2019ve seen cyberattacks grow in sophistication and frequency, with malicious actors benefitting from growing geopolitical conflicts, economic uncertainty and rapid digitalization. One consequence of this digitalization is that organizations are more connected than ever. Many enterprise networks combine traditional IT devices with smart IoT sensors, and OT assets that interact with the physical world. This drastically increases the attack surface and creates new network blind spots.<\/p>\n<p>Protecting ourselves from emerging threats means we can\u2019t continue using the same approach we\u2019ve been taking to network security.<\/p>\n<p>Here are five essential steps for combating emerging threats. <a href=\"\/ebook-5-steps-to-combating-emerging-threats-with-network-security\/\">You can also download the full eBook<\/a>.<\/p>\n<h2>Step 1: Know what assets are connected to your network<\/h2>\n<p><a href=\"\/blog\/cybersecurity-asset-management-know-whats-on-your-network\/\">Asset management<\/a> lays the foundation for network security. You need to know what\u2019s connected, who uses it, where it\u2019s located and what it communicates with. Preferably all this information is in one place, but that\u2019s usually not the case.<\/p>\n<p>If you\u2019re using tools for endpoint detection, vulnerability assessment and configuration management, each of them likely has an inventory of assets or IP addresses. They probably overlap quite a bit since they\u2019re typically deployed on managed assets such as laptops and workstations. But today\u2019s attackers are targeting smart sensors in power generating stations, IP cameras in retail locations and industrial controllers on assembly lines. To fully understand your attack surface, you must deploy multiple discovery techniques to uncover the unmanaged assets hiding in your blind spots.<\/p>\n<p>The Forescout\u00ae Platform uses <a href=\"\/products\/eyesight\/\">more than 30 active and passive discovery techniques<\/a> to deliver complete visibility of every connected asset. Certain types of assets require a specific approach to identify, classify and assess them without disrupting their operations. This is essential because some of these assets might monitor or perform critical processes that could severely impact your business if they were compromised or taken offline.<\/p>\n<h2>Step 2: Control network access<\/h2>\n<p>The next step is controlling which assets should and shouldn\u2019t be on your network. But controlling network access isn\u2019t just about authentication. Many unmanaged or unagented assets don\u2019t have the concept of a \u201cuser\u201d or \u201cidentity\u201d to authenticate with.<\/p>\n<p>How do you handle these assets when you want to enforce pre-connect authentication like 802.1X? Typically, security teams end up with a bypass list that connects anything with an allowed MAC address onto the network. This puts attackers one spoofed MAC address away from gaining access to your network.<\/p>\n<p>A better approach is to go beyond basic authentication and <a href=\"\/blog\/do-not-just-ensure-cybersecurity-asset-compliance-prove-it\/\">assess an asset\u2019s compliance and risk posture<\/a> before granting access and continuously thereafter, watching for changes in configuration, communication and behavior that go against your policies. This best practice derives from a core principle of zero trust: never trust, always verify.<\/p>\n<p>The Forescout Platform features a flexible policy engine that enables you to <a href=\"\/products\/eyecontrol\/\">automate and apply targeted control actions<\/a>, from moderate to stringent, based on your needs. For example, you can apply policy-based controls that enforce device compliance or quarantine an infected endpoint to rapidly respond to incidents.<\/p>\n<h2>Step 3: Limit asset movement and communication on the network<\/h2>\n<p>Another core principle of zero trust is to assume you\u2019ve been breached.<\/p>\n<p>When an attacker exploits a vulnerability in an IP camera, their end goal isn\u2019t to simply kick back and watch the video feed; they want to move and propagate across the network in search of something worth extorting \u2013 such as customer data, financial results, or patents and other intellectual property.<\/p>\n<p>The best way to fight extortion is before it happens. That means enforcing least privilege access through <a href=\"https:\/\/www.forescout.com\/dynamic-network-segmentation-zero-trust\/\">dynamic network segmentation<\/a> and access controls that restrict unauthorized communication and shrink the blast radius if someone gets in. Flat, undersegmented networks allow emerging threats to propagate, increasing risk and exposure.<\/p>\n<p>First, you need to analyze how assets are communicating. Being able to map the connections between assets allows you to effectively implement policies to block communication over certain protocols or to certain IPs, while allowing normal business operations to continue.<\/p>\n<p>With Forescout\u2019s <a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\">traffic matrix and segmentation simulator<\/a>, you can test policy changes and see how they impact communication flows before implementing them to minimize risk and the chance for costly disruptions or project delays.<\/p>\n<h2>Step 4: Leverage your existing security tools<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-79133\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg\" alt=\"\" width=\"450\" height=\"443\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-768x756.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec.jpg 900w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><br \/>\nIt\u2019s no secret that there\u2019s a major cyber skills shortage, not to mention the alert fatigue and burnout experienced by many security teams. To manage this, you must integrate your existing cybersecurity tools so that they share information and can perform orchestrated workflows without human intervention. For example, you could trigger a scan from your endpoint detection and response (EDR) tool whenever a transient device rejoins the network instead of waiting for the next scheduled scan. Or, you could update your configuration management database (CMDB) whenever a new asset is identified and classified.\n<p>Just because you know a device exists doesn\u2019t mean it can be secured like a traditional asset. Take patching vulnerabilities. When Microsoft releases a new patch, deploying it across affected devices is relatively easy. But what about smart devices or IoT sensors? Their embedded firmware will rarely see an update; even if they do, many perform critical functions and can\u2019t easily be taken offline for the update to be applied.<\/p>\n<p>When dealing with thousands of these unmanaged devices, combined with the skills shortage and alert fatigue, a risk-based approach to prioritizing your efforts is essential.<\/p>\n<h2>Step 5: Automate remediation and incident response<\/h2>\n<p>Attackers can move at machine speed because they deploy automation to test and exploit vulnerabilities at scale. That means you must <a href=\"\/blog\/cyber-skills-shortage-the-time-for-security-automation-is-now\/\">automate your response<\/a>, too.<\/p>\n<p>This includes everything from automatically remediating noncompliant assets so they can quickly and safely connect, to dynamically quarantining risky assets so attackers can\u2019t use them to infiltrate the rest of the network.<\/p>\n<p>Within <a href=\"\/solutions\/zero-trust\/\">a zero trust architecture<\/a> (ZTA), it\u2019s the policy decision point, or PDP, that orchestrates the enforcement of security controls and responds to threats through your various enforcement points. The PDP is the central repository for your security policies, making managing and auditing your practices easier. It collects multiple intelligence sources to make decisions carried out by the enforcement points.<\/p>\n<p><strong>That\u2019s<\/strong> <strong>why<\/strong> <strong>there\u2019s<\/strong> <strong>no<\/strong> <strong>such<\/strong> <strong>thing<\/strong> <strong>as<\/strong> <strong>a<\/strong> <strong>single-vendor,<\/strong> <strong>all-in-one<\/strong> <strong>zero<\/strong> <strong>trust<\/strong> <strong>solution.<\/strong> Each piece of the architecture plays a vital role in keeping your network, assets, applications and users secure.<\/p>\n<p>Forescout\u2019s flexible policy engine has fully customizable policy templates for discovering and assessing unmanaged assets and automating your response to threats. A robust PDP that centralizes your security policies builds a strong foundation for your ZTA.<\/p>\n<h2>Putting it all together<\/h2>\n<p>Traditional ways of identifying devices using point-in-time scans or software agents don\u2019t cut it with today\u2019s rapidly evolving threat landscape. Any asset that goes undiscovered on your network introduces potential risks to your organization. That\u2019s why total visibility is essential to hardening your security framework against emerging threats.<\/p>\n<p>Think about how much of your attack surface you can see today \u2013 20%? 50%? 85%? How confident are you in your coverage and intelligence on unmanaged, non-traditional assets?<\/p>\n<p>If you don\u2019t like the answer, follow the steps in this post to modernize your network security to combat emerging threats.<\/p>\n<a href=\"\/webinars\/?webinar=584727\"  title=\"WATCH THE WEBINAR\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">WATCH THE WEBINAR<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s rapidly evolving threat landscape, cybercriminals have become more sophisticated than ever, making it crucial to stay abreast of the latest trends and tactics. The challenge is exacerbated by the expanding attack surface as more devices and device types connect to enterprise networks: IT, OT, IoT and IoMT devices, all with known vulnerabilities that [&hellip;]<\/p>\n","protected":false},"author":182,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[749],"class_list":["post-79091","post","type-post","status-publish","format-standard","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Steps to Combating Emerging Threats with Network Security - Forescout<\/title>\n<meta name=\"description\" content=\"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Steps to Combating Emerging Threats with Network Security - Forescout\" \/>\n<meta property=\"og:description\" content=\"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-27T15:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-27T17:13:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg\" \/>\n<meta name=\"author\" content=\"Joe Thibault\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\"},\"author\":{\"name\":\"Joe Thibault\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/31f0451bf7d1e7dc7503fd689688c271\"},\"headline\":\"5 Steps to Combating Emerging Threats with Network Security\",\"datePublished\":\"2023-06-27T15:00:37+00:00\",\"dateModified\":\"2023-06-27T17:13:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\"},\"wordCount\":1299,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\",\"name\":\"5 Steps to Combating Emerging Threats with Network Security - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg\",\"datePublished\":\"2023-06-27T15:00:37+00:00\",\"dateModified\":\"2023-06-27T17:13:10+00:00\",\"description\":\"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec.jpg\",\"width\":900,\"height\":886},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Steps to Combating Emerging Threats with Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/31f0451bf7d1e7dc7503fd689688c271\",\"name\":\"Joe Thibault\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/565c236c02970a1ab3add6dc090ec772\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/000dd576270e12be3f2bbcf20ad2fc4661c7e36b9efef0eaa3d65237b5f6aaa8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/000dd576270e12be3f2bbcf20ad2fc4661c7e36b9efef0eaa3d65237b5f6aaa8?s=96&d=mm&r=g\",\"caption\":\"Joe Thibault\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Steps to Combating Emerging Threats with Network Security - Forescout","description":"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/","og_locale":"en_US","og_type":"article","og_title":"5 Steps to Combating Emerging Threats with Network Security - Forescout","og_description":"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.","og_url":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2023-06-27T15:00:37+00:00","article_modified_time":"2023-06-27T17:13:10+00:00","og_image":[{"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg","type":"","width":"","height":""}],"author":"Joe Thibault","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/"},"author":{"name":"Joe Thibault","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/31f0451bf7d1e7dc7503fd689688c271"},"headline":"5 Steps to Combating Emerging Threats with Network Security","datePublished":"2023-06-27T15:00:37+00:00","dateModified":"2023-06-27T17:13:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/"},"wordCount":1299,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/","url":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/","name":"5 Steps to Combating Emerging Threats with Network Security - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec-300x295.jpg","datePublished":"2023-06-27T15:00:37+00:00","dateModified":"2023-06-27T17:13:10+00:00","description":"Understand the 5 key steps of network security: cyber asset inventory, NAC, segmentation, tool orchestration, and automated remediation and incident response.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/5_Essentials_NetSec.jpg","width":900,"height":886},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/5-steps-to-combating-emerging-threats-with-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"5 Steps to Combating Emerging Threats with Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/31f0451bf7d1e7dc7503fd689688c271","name":"Joe Thibault","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/565c236c02970a1ab3add6dc090ec772","url":"https:\/\/secure.gravatar.com\/avatar\/000dd576270e12be3f2bbcf20ad2fc4661c7e36b9efef0eaa3d65237b5f6aaa8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/000dd576270e12be3f2bbcf20ad2fc4661c7e36b9efef0eaa3d65237b5f6aaa8?s=96&d=mm&r=g","caption":"Joe Thibault"}}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/79091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79091"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/79091\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=79091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=79091"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}