The Defense Department created Comply to Connect (C2C) as a way to secure its growing array of network endpoints. It is a formal framework for validating new devices, evaluating their compliance with DoD security policies, and continuously monitoring these assets to ensure they remain in security compliance. It also provides automated remediation of device issues, reducing the impact of maintaining cyber hygiene on cybersecurity administrators.
This course examines the challenges to secure device adoption and connection at DoD, as well as how C2C helps defense agencies overcome those challenges. It also walks through a workflow of four phases to implement the C2C framework and explores solutions that can help automate C2C.
This course was informed by Dean Hullings, Senior Solutions Strategist at Forescout. To learn more about securing DoD connections, check out these additional resources:
- Comply to Connect Webinar
- Comply to Connect: Implement Controlling Countermeasures to Safeguard Your Information Systems
- Comply to Connect With the Forescout Platform