Over 258,953 professionals have used IT Central Station research.
Compare the best Endpoint Compliance vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
The most valuable features of ForeScout is the fact that it can do network access control either with 802.1x or without 802.1x. Many network devices are not ready to do 802.1x. Lots of endpoints are not ready to do it, or they're poor at it,... more»
We did not have a NAC prior to ForeScout. It provides constant monitoring of the endpoints either through an agent or periodic monitoring with a local admin account. This makes posturing very easy to do. Once the device is on the network,... more»
Definitely, having more third-party integration would be an improvement. This is something that they're doing. Other products that we have on our network, if we're able to get ForeScout to talk with them, we'll get much better information to... more»
As a university, we have used ForeScout to help us get a hold on student computers and their infections, and to keep those infected systems off our network. We are also currently using ForeScout as a mechanism to allow us to automatically... more»
ForeScout has the built-in ability to identify network devices without a separate subscription or device, and that allows us to identify when students plug into a switch or router (not allowed on our network), or tries to put their computer... more»
The configuration of the rules is both a blessing and a curse. While it is almost infinitely configurable, knowing how to get the product to do what you want it to do can be difficult, especially at first. The biggest problem we have had with... more»
* Network Access Control, it's core use * Asset Intelligence for deskside * "What port is it plugged into" intelligence for deskside * Patch-level Auditing * Emergency response, risk assessment information to get a view of the of the... more»
* Immediate relocation of network devices to segregated "Vendor" network based on autonomous analysis. Prevents scanning, malware spread, corporate asset (i.e. printer) misuse, and reconnaissance on our network by third-party devices. Allows... more»
The most important feature is that this solution works well without a 802.1x feature. You can use CounterACT to implement that feature and also have a very granular control of your devices, including shadow devices.
We were searching for a solution that could help us not only to detect and manage unauthorized access, but also to implement 802.1x on our infrastructure. And when we were working to reach that goal, we found other improvements from using... more»
Information Security Manager at a legal firm with 1,001-5,000 employees
What do you think of ForeScout CounterACT?
The most valuable feature for us is the real-time alerting of newly connected devices, whether they are approved or unapproved devices on our network.
• Improvements to My Organization
Since our implementation of CounterACT, it has kept us aware of unapproved devices attempting to connect to our network which pose security threats.
• Room for Improvement
The reporting could be a bit more intuitive and user friendly.
• Use of Solution
I have used CounterACT for two years.
• Deployment Issues
There were many issues with deployment, but these were largely due to our own network architecture issues.
• Stability Issues
There were many issues with stability, but these were largely due to our own network architecture issues.
VP IT Security at a financial services firm with 501-1,000 employees
Jun 25 2017
What do you think of ForeScout CounterACT?
The most valuable feature for us is the visibility into all connected devices. Also, the plugins are very robust -- the ability scanner, patch management system, and SQL integrator.
• Improvements to My Organization:
You can query a lot of information from the connected device, including their compliance statuses.
• Deployment Issues:
We've had no issues with deployment.
• Stability Issues:
It's a stable solution.
• Scalability Issues:
There have been no issues with scaling it.
• Initial Setup:
The initial setup was complex, but that was due to the nature of the network architecture.
• Other Solutions Considered:
We didn't look for other solutions.
• Other Advice:
Have a clear understanding and document the network...
Real users choose their top endpoint protection software
What do Users Look for when Choosing their Endpoint Protection Tools?
According to Eric Cole of the SANS Institute, big data breaches and large-scale compromises often start with an initial compromise in an endpoint device, such as a... more»