Over 279,610 professionals have used IT Central Station research.
Compare the best Endpoint Compliance vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
The most valuable features of ForeScout is the fact that it can do network access control either with 802.1x or without 802.1x. Many network devices are not ready to do 802.1x. Lots of endpoints are not ready to do it, or they're poor at it,... more»
We did not have a NAC prior to ForeScout. It provides constant monitoring of the endpoints either through an agent or periodic monitoring with a local admin account. This makes posturing very easy to do. Once the device is on the network,... more»
Definitely, having more third-party integration would be an improvement. This is something that they're doing. Other products that we have on our network, if we're able to get ForeScout to talk with them, we'll get much better information to... more»
* Network Access Control, it's core use * Asset Intelligence for deskside * "What port is it plugged into" intelligence for deskside * Patch-level Auditing * Emergency response, risk assessment information to get a view of the of the... more»
* Immediate relocation of network devices to segregated "Vendor" network based on autonomous analysis. Prevents scanning, malware spread, corporate asset (i.e. printer) misuse, and reconnaissance on our network by third-party devices. Allows... more»
Primary Use Case
We're using it for anti-virus, and its performance is okay.
• Improvements to My Organization
Its benefit is that it provides virus protection.
• Valuable Features
FortiClient has good signatures, good protection and, up until recently, it integrated really well with our firewall.
• Room for Improvement
I'm hoping they change the management system. The management is no longer applicable for us, so I want that to go back to the way it was.
• Use of Solution
One to three years.
• Stability Issues
The stability is excellent.
• Scalability Issues
It is definitely scalable.
• Customer Service and Technical Support
I haven't used tech support.
• Initial Setup
The initial setup was straightforward.
• Other Advice
Our most important...
VP IT Security at a financial services firm with 501-1,000 employees
Jun 25 2017
What do you think of ForeScout CounterACT?
The most valuable feature for us is the visibility into all connected devices. Also, the plugins are very robust -- the ability scanner, patch management system, and SQL integrator.
• Improvements to My Organization:
You can query a lot of information from the connected device, including their compliance statuses.
• Deployment Issues:
We've had no issues with deployment.
• Stability Issues:
It's a stable solution.
• Scalability Issues:
There have been no issues with scaling it.
• Initial Setup:
The initial setup was complex, but that was due to the nature of the network architecture.
• Other Solutions Considered:
We didn't look for other solutions.
• Other Advice:
Have a clear understanding and document the network...
Real users choose their top endpoint protection software
What do Users Look for when Choosing their Endpoint Protection Tools?
According to Eric Cole of the SANS Institute, big data breaches and large-scale compromises often start with an initial compromise in an endpoint device, such as a... more»