We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The actions that the agentless visibility, allow us to perform on the endpoint, are really amazing, especially in the way that it is done."
"We think it's simple. We think it's very useful and we really like reports and everything."
"You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as."
"The user management has been very easy for the most part."
"The interface is easy to use."
"The user interface is quite simple."
"It has helped with improving our security posture in terms of controlling the access of rogue devices into our network through identification. We have been able to prevent rogue device activities on the network, check the health of the system, and ensure remediation."
"I have noticed that in the last year the license model has changed from licensing the whole appliance to licensing the number of devices. It's more simple for a large installation, or a user to have CounterACT as their peripheral site in the company. It's a good choice to have changed the license policy."
"The API is a great way to get information from other tools."
"The solution does have a bit of complexity, and there's some complexity in the deployment. Users need to be trained before undertaking an initial setup."
"The reporting feature needs improvement."
"When adding what is in scope to a policy, it would be nice if you could select multiple policies instead of one policy at a time to add what is in the scope for network segmentation. I have found that during the install and configuration of the policies that if you want to modify multiple policies or enable multiple policies that you need to define what is in the scope (IP range or segments) one rule at a time. This caused some slow downs when implementing policies."
"The ability to block external devices in Mac is lacking and needs to be added."
"I should be able to integrate my Forescout with any other third party security technology, to build that connected security strategy."
"For the user, the policy that they have implemented sometimes needs adjustments. Sometimes the features that the customer asks for aren't involved in the main installation, and I need to bolt an add-on in. However, I never know if this policy is the right one when I do this."
"Better integration with third-party vendors is needed because as it is now, the list of third-party solutions that we can integrate and automate is quite limited."
"As a user, if I am using a laptop that is Wi-Fi connected, Forescout identifies my port connectivity as one user license, and if I take that same laptop with the same username to a wired network, which is also the same network that is used for the Wi-Fi connection, Forescout detects it as a separate license."
"The service macmon offers is already great."
"Licenses are perpetual but can come with renewable support."
"Forescout Platform is too expensive, so the price should be reduced."
"The ROI is priceless."
"We might have paid in the ballpark of $20,000 yearly for our licenses. I do not recall there being other fees over and above the standard licensing fee."
"We went with the virtual appliance option. The biggest cost to running these types of appliances would be to either have multiple virtual appliances at every data center or running Remote SPAN hardware to provide you the real-time network visibility."
"The setup cost, pricing, and licensing are on the high side."
"The fact that we were allowed to spin up as many servers as we had need of to support our geographic requirements while paying for licensing as an enterprise truly set Forescout apart from the crowd and improved the way we could design our access."
"Time savings in finding rogue devices as well as identifying potentially unwanted devices on the network has saved the organization time and money."
ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings.
With macmon Network Access Control you always know which devices are connected to your network and where. It provides profound protection for your corporate network and is a centralized security authority that protects your network against intrusion from unauthorized devices, and ensures the complete overview of all your devices.
UFOs (unknown frightening objects) are a thing of the past, as all your devices such as PCs, printers, laptops, medical and technical devices are identified at any time, efficiently monitored and protected against unauthorized access. Guest and employee devices (BYOD) can be easily and securely authorized via the macmon guest service using dynamic management of network segmentation.
To protect your network against unauthorized access, macmon provides two efficient product bundles as well as additional Add-Ons.
Forescout Platform is ranked 2nd in Network Access Control (NAC) with 17 reviews while macmon Network Access Control is ranked 7th in Network Access Control (NAC) with 1 review. Forescout Platform is rated 8.8, while macmon Network Access Control is rated 10.0. The top reviewer of Forescout Platform writes "Identifying potentially unwanted devices on the network has saved the organization time and money". On the other hand, the top reviewer of macmon Network Access Control writes "Communicates well with third-party products, offers good security, and has helpful technical support". Forescout Platform is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Fortinet FortiNAC, Armis and Portnox CORE, whereas macmon Network Access Control is most compared with Aruba ClearPass, Cisco ISE (Identity Services Engine) and Fortinet FortiNAC.
See our list of best Network Access Control (NAC) vendors.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.