Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Xona and Forescout Partner to Deliver Secure Remote Access
Solutions & Tech

Xona and Forescout Partner to Deliver Secure Remote Access

Staff WriterBy Staff WriterJune 10, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Together, Xona’s Secure Remote Access Platform and Forescout’s OT Security Solutions Help Industrial Organizations Connect Without Exposing Critical Assets

Xona, the leading provider of secure access for critical infrastructure, announced a strategic partnership with Forescout Technologies, a global cybersecurity leader. The integration between the Xona Platform and the Forescout 4D Platform will give industrial and critical infrastructure operators secure, policy-enforced access to operational systems, backed by continuous network visibility and automated enforcement.

As threats to industrial control systems intensify and compliance requirements become more demanding, the integration of Forescout’s continuous device visibility, intelligence, and control with Xona’s secure remote access capabilities enables operators to modernize security without compromising uptime, safety, or regulatory posture. This partnership ensures that every user and device interaction is authenticated, authorized, and audited—delivering secure, compliant, and uninterrupted operations across critical infrastructure.

Cyber Technology Insights : Azul Introduces 100 – 1000x More Accurate In-Production Java Vulnerability Detection

“Our mission is to help critical infrastructure teams connect securely without exposing critical assets,” said Bill Cantrell, Chief Product & Operating Officer at Xona. “By integrating with Forescout for OT Security, we’re making that mission easier by enabling real-time asset data and security oversight. This partnership means zero-trust access decisions can now be driven by live context—not just static policies. It’s a major step forward in OT cyber resilience.”

Better Together: Unified Access, Visibility, and Control
The best of breed platforms combine the unique strengths of both organizations:

Zero-Trust Access with Reduced Operational Complexity: Xona delivers secure, browser-based access to critical systems without requiring VPNs, clients, or network tunnels. When paired with Forescout’s real-time asset discovery, security teams can dynamically identify and import assets to configure identity-level controls. This ensures users only access authorized assets and systems, when they’re authorized to access them.

Context-Aware Policy Enforcement: Forescout’s dynamic risk scoring and segmentation logic automatically influence access permissions and session behavior inside Xona. High-risk assets can be isolated, and user access can be denied or revoked in real time, preventing lateral movement and enforcing least privilege access across the OT environment.

Cyber Technology Insights : Trellix Finds Threat Intelligence Gap Calls for Cybersecurity Strategy

Built-In Compliance and Session Auditing: Xona’s high-fidelity session recording, file transfer governance, and policy-based controls are now enriched with live network telemetry from Forescout, simplifying audit prep for standards like NERC CIP, IEC 62443, TSA SD2, and OTCC-1. Every session is visible, controlled, and accounted for.

Secure Vendor and Third-Party Access Without Exposure: Together, Xona and Forescout eliminate the traditional blind spots around remote access. Contractors, OEMs, and internal users can gain time-limited access with full oversight, without ever exposing underlying network layers or requiring standing credentials.

“OT environments demand both visibility and control,” said Christina Hoefer, Vice President of OT/ IoT Vertical and Strategy, Forescout Technologies. “Our partnership with Xona extends that control to secure remote access, ensuring every session is verified, authorized, and monitored without exceptions. Together, we’re helping customers enforce zero trust principles across their most critical infrastructure to protect OT, IT, and cloud environments at scale.”

Cyber Technology Insights : Blackpoint Cyber and UKON Partner to Redefine Cyber Risk Protection

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: prnewswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTekStream, NJIT partner to empower learning
Next Article Strengthening Security: Rotating ConnectWise Code Signing Certificates
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Adeel Shaikh Releases Updated Book on AI-Driven SOC Shif

June 14, 2025

Glider AI Launches ID Verify to Tackle Hiring Fraud Risks

June 14, 2025

SutiSign Boosts eSignature Security with Smart ID Verificatio

June 14, 2025
Leave A Reply Cancel Reply

Latest Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 20250 Views

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 20250 Views

WestJet Faces Cyberattack: A Major Disruption

June 16, 20250 Views

Critical Vulnerabilities Resolved in Tenable Nessus Agent

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.