We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is the blocking of USB devices."
"The user interface is quite simple."
"It allows for good detection of all the vendor products we have on-site."
"We think it's simple. We think it's very useful and we really like reports and everything."
"We really like that we get full visibility of devices in the local network."
"I have noticed that in the last year the license model has changed from licensing the whole appliance to licensing the number of devices. It's more simple for a large installation, or a user to have CounterACT as their peripheral site in the company. It's a good choice to have changed the license policy."
"Forescout CounterACT has allowed us to better open our access and control wireless access globally from our HQ. This allows us to monitor the network access for every office globally. This has improved overall security, reducing risk and opening up the opportunity to provide greater end user flexibility."
"Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security."
"The key differentiator is that it manages mobile devices and laptops in the same console. Windows and Linux are on the same console. This is the only product that does this. It's really the best in the industry."
"The ability to block external devices in Mac is lacking and needs to be added."
"The solution does have a bit of complexity, and there's some complexity in the deployment. Users need to be trained before undertaking an initial setup."
"The solution could always improve by adding more features to make it more robust."
"The biggest disadvantage is the pricing."
"It's scalable, but not without a big investment. It doesn't do so well at the branch. At the home office, it does okay and not so well at the branch."
"For the user, the policy that they have implemented sometimes needs adjustments. Sometimes the features that the customer asks for aren't involved in the main installation, and I need to bolt an add-on in. However, I never know if this policy is the right one when I do this."
"More detailed analysis during the authentication process, especially for troubleshooting access issues. We have found that troubleshooting RADIUS controls is quite arduous, as it is today. A trace function could easily resolve this by providing a means by which access issues from a certificate to passwords or accounts could easily be identified and remediated."
"They need to handle their Tier 1 cases differently. The biggest negative regarding Forescout is their support. Not having the ability to get instantly transferred to a support engineer for Tier 1 cases is pretty ridiculous."
"When you open a new mobile, you automatically come onboard the mobile on the Ivanti platform but it needs some improvements."
"The fact that we were allowed to spin up as many servers as we had need of to support our geographic requirements while paying for licensing as an enterprise truly set Forescout apart from the crowd and improved the way we could design our access."
"We went with the virtual appliance option. The biggest cost to running these types of appliances would be to either have multiple virtual appliances at every data center or running Remote SPAN hardware to provide you the real-time network visibility."
"The ROI is priceless."
"It might not be the cheapest solution, but you get what you pay for."
"Time savings in finding rogue devices as well as identifying potentially unwanted devices on the network has saved the organization time and money."
"The setup cost, pricing, and licensing are on the high side."
"Forescout Platform is too expensive, so the price should be reduced."
"Licenses are perpetual but can come with renewable support."
Earn 20 points
ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings.
Your users and your enterprise’s critical IT resources face an ever-evolving range of threats, from online criminals to internal mistakes. LANDESK Security Suite helps to maximize protection against those threats. It delivers multi-layered endpoint protection, even against zero-day threats, without compromising user productivity. It automates patching of critical operating systems and third-party applications, even on systems that are mobile, remote, or asleep. LANDESK Security Suite boosts compliance with industry standards, ensures your user environment is stable and secure, and integrates with systems management to further reduce risk and extend protection and control.
Forescout Platform is ranked 4th in Endpoint Compliance with 17 reviews while Ivanti Endpoint Security for Endpoint Manager is ranked 6th in Endpoint Compliance with 1 review. Forescout Platform is rated 8.8, while Ivanti Endpoint Security for Endpoint Manager is rated 8.0. The top reviewer of Forescout Platform writes "Identifying potentially unwanted devices on the network has saved the organization time and money". On the other hand, the top reviewer of Ivanti Endpoint Security for Endpoint Manager writes "Covers all aspects surrounding the endpoint and it manages mobile devices and laptops in the same console". Forescout Platform is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Fortinet FortiNAC, Armis and Portnox CORE, whereas Ivanti Endpoint Security for Endpoint Manager is most compared with BigFix, Tanium, Microsoft Defender for Endpoint, Symantec End-User Endpoint Security and Lumension Endpoint Management and Security.
See our list of best Endpoint Compliance vendors.
We monitor all Endpoint Compliance reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.