Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation

February 23, 2026

Empowering the Agentic Endpoint

February 22, 2026

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Xona and Forescout Partner to Deliver Secure Remote Access
Uncategorized

Xona and Forescout Partner to Deliver Secure Remote Access

Staff WriterBy Staff WriterJune 10, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Together, Xona’s Secure Remote Access Platform and Forescout’s OT Security Solutions Help Industrial Organizations Connect Without Exposing Critical Assets

Xona, the leading provider of secure access for critical infrastructure, announced a strategic partnership with Forescout Technologies, a global cybersecurity leader. The integration between the Xona Platform and the Forescout 4D Platform will give industrial and critical infrastructure operators secure, policy-enforced access to operational systems, backed by continuous network visibility and automated enforcement.

As threats to industrial control systems intensify and compliance requirements become more demanding, the integration of Forescout’s continuous device visibility, intelligence, and control with Xona’s secure remote access capabilities enables operators to modernize security without compromising uptime, safety, or regulatory posture. This partnership ensures that every user and device interaction is authenticated, authorized, and audited—delivering secure, compliant, and uninterrupted operations across critical infrastructure.

Cyber Technology Insights : Azul Introduces 100 – 1000x More Accurate In-Production Java Vulnerability Detection

“Our mission is to help critical infrastructure teams connect securely without exposing critical assets,” said Bill Cantrell, Chief Product & Operating Officer at Xona. “By integrating with Forescout for OT Security, we’re making that mission easier by enabling real-time asset data and security oversight. This partnership means zero-trust access decisions can now be driven by live context—not just static policies. It’s a major step forward in OT cyber resilience.”

Better Together: Unified Access, Visibility, and Control
The best of breed platforms combine the unique strengths of both organizations:

Zero-Trust Access with Reduced Operational Complexity: Xona delivers secure, browser-based access to critical systems without requiring VPNs, clients, or network tunnels. When paired with Forescout’s real-time asset discovery, security teams can dynamically identify and import assets to configure identity-level controls. This ensures users only access authorized assets and systems, when they’re authorized to access them.

Context-Aware Policy Enforcement: Forescout’s dynamic risk scoring and segmentation logic automatically influence access permissions and session behavior inside Xona. High-risk assets can be isolated, and user access can be denied or revoked in real time, preventing lateral movement and enforcing least privilege access across the OT environment.

Cyber Technology Insights : Trellix Finds Threat Intelligence Gap Calls for Cybersecurity Strategy

Built-In Compliance and Session Auditing: Xona’s high-fidelity session recording, file transfer governance, and policy-based controls are now enriched with live network telemetry from Forescout, simplifying audit prep for standards like NERC CIP, IEC 62443, TSA SD2, and OTCC-1. Every session is visible, controlled, and accounted for.

Secure Vendor and Third-Party Access Without Exposure: Together, Xona and Forescout eliminate the traditional blind spots around remote access. Contractors, OEMs, and internal users can gain time-limited access with full oversight, without ever exposing underlying network layers or requiring standing credentials.

“OT environments demand both visibility and control,” said Christina Hoefer, Vice President of OT/ IoT Vertical and Strategy, Forescout Technologies. “Our partnership with Xona extends that control to secure remote access, ensuring every session is verified, authorized, and monitored without exceptions. Together, we’re helping customers enforce zero trust principles across their most critical infrastructure to protect OT, IT, and cloud environments at scale.”

Cyber Technology Insights : Blackpoint Cyber and UKON Partner to Redefine Cyber Risk Protection

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: prnewswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTekStream, NJIT partner to empower learning
Next Article Strengthening Security: Rotating ConnectWise Code Signing Certificates
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025
Leave A Reply Cancel Reply

Latest Posts

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026

Revolutionizing ICS Security: The Power of OT Deception in Active Defense

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation
  • Empowering the Agentic Endpoint
  • Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits
  • Revolutionizing ICS Security: The Power of OT Deception in Active Defense
  • Redefining Productivity: Why AI Should Replace Workflows
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation

February 23, 2026

Empowering the Agentic Endpoint

February 22, 2026

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026
Most Popular

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202510 Views

The CTEM Conversation We All Need

June 30, 202510 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.