Forescout Platform Benefits
MG
reviewer2012112
Enterprise Level Policy Manager at a government with 10,001+ employees
We can do a lot with Forescout. We use it to quarantine non-compliant machines. We use it to mitigate vulnerabilities. We can push patches, and we can push scripts through Forescout. For example, if we need to know how many Windows machines are using the 10.9 image or whatever, we can look that up easily.
View full review »The federal government's continuous diagnostics and mitigation programs are the focus of the current project I'm working on.
It's one of the tools that has given the federal government visibility into network devices and everything.
View full review »Forescout Platform has made it possible to block people working near our construction sites who should not have access to our network.
View full review »Buyer's Guide
Forescout Platform
March 2024
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
DO
SecEng3904
Senior Security Engineer at a healthcare company with 10,001+ employees
We are now able to see the assets connected to our network and classify them based on certain criteria that we can define. We still have a ways to go in getting things setup and more networks defined on what we want to see. Forescout is allowing us to gain that visibility with a few clicks of the mouse. Being able to sort on device types or devices with open ports is helpful when narrowing down assets of possible misconfigured devices that may be vulnerable on the network. We can take action on those devices based off of corporate policy.
View full review »AS
Avraham Sonenthal
Senior Network Engineer at a government with 5,001-10,000 employees
With Forescout we can get a detailed view of every device that attaches or tries to attach to our network. We can write policies that enforce a variety of actions such as quarantine and remediation.
We can prevent rogue actors from utilizing switch ports, wireless, or VPN to access our network.
Another benefit to Forescout is in inventory knowledge. We are seeing many devices that nobody knew were attached to the network and this allows the various teams to remediate or remove devices that could present a threat.
View full review »Before our implementation of Forescout, we had no Network Access Control. This allowed all users, trusted and unknown, to access our internal infrastructure. This was a burden because we are in the contract manufacturing sector where each independent contractor brings in their own infrastructure and it is up to us to secure these networks. Since implementing CounterACT, we have been able to isolate and segment all unknown devices, providing strict requirements for device on boarding. Since implementing Forescout, our environment is significantly more secure.
We did not have a NAC prior to ForeScout. It provides constant monitoring of the endpoints either through an agent or periodic monitoring with a local admin account. This makes posturing very easy to do. Once the device is on the network, we're able to determine, does it continue to meet the requirements that we need for a device to stay on the network?
View full review »MV
Michael Varga
IS-Operations Security Analyst at a energy/utilities company with 10,001+ employees
- Immediate relocation of network devices to segregated "Vendor" network based on autonomous analysis. Prevents scanning, malware spread, corporate asset (i.e. printer) misuse, and reconnaissance on our network by third-party devices. Allows us to block VPN from our corporate network but still allow Vendors to establish them.
- Better information provided by Level 1 support (helpdesk) regarding asset information as we provide them with R/O access to the tool
- Visitor policy communication & acceptance
Automation! One broad example is that we can now stop network threats right away and without intervention.
View full review »Forescout Platform allows actions to be automated, which reduces the response time to any suspicious or malicious activity.
View full review »MH
reviewer1090179
Senior Advisor/Architect at a consultancy with 51-200 employees
As a result of using Forescout, we had a better overview of all the devices, known and unknown, that were connected to our network; it was a real advantage.
NAC: Forescout CounterACT has allowed us to better open our access and control wireless access globally from our HQ. This allows us to monitor the network access for every office globally. This has improved overall security, reducing risk and opening up the opportunity to provide greater end user flexibility.
View full review »We use it to prevent malicious activities on our network that potentially infiltrate it. We've been able to take out over twenty percent of our threats connected into our environment that we just never had a means to stop from connecting up to our network.
We've discovered regular assets. Let's say you had a mobile device, you walked into our network, and you said "hey, I need to connect up to the network. I'm a contractor here for you all and I'm going to add in one device". You immediately now have access into our environment.
View full review »It has helped with improving our security posture in terms of controlling the access of rogue devices into our network through identification. We have been able to prevent rogue device activities on the network, check the health of the system, and ensure remediation.
It has provided visibility into the workings of our routers and switches. We also extended this capability to our branch offices through a WAN connection.
View full review »ForeScout has the built-in ability to identify network devices without a separate subscription or device, and that allows us to identify when students plug into a switch or router (not allowed on our network), or tries to put their computer on the less restrictive game console VLAN. The rule sets allow you to configure different rules for different devices or networks from a single location, and provides a single-pane-of-glass view into any network traffic it can see.
View full review »I think the most valuable piece is to make sure that devices that we don't want on our network aren't on it. That's the most important. Somebody walks into a will-call area or to an area that's, say, open to the public, and they plug in a computer, that computer may have an exploit or is malicious in some way. It won't get an IP address and won't be connected. That's the most important feature.
View full review »RM
RobertoMarinozzi
System Engineer at Maticmind S.p.A.
It permit to treats the access policy without lists of macaddresses but by mean a dynamic policy
it permits to discover and classify a lot of devices that the organization forgets to have to manage
View full review »
MK
Manuel Keller
Head of Network and Communication Department at a program development consultancy with 10,001+ employees
The reporting for audits start with the knowledge of the devices in the network and the services running on them. ForeScout provides the foundation for the needed information.
View full review »The problem with vendors like Cisco is that their solutions are limited their to own ecosystem, and in general they don't work well with other vendors. With virtual machines, it can actually collect data from a variety of different network solutions, such as Cisco, Bloomberg, etc. Any routing platform out there, you can import it today. It can basically integrate these products and you can use it for enforcement. You can use them to collect the data.
The other one is obviously that CounterACT can provide you with virtual ability to control who gets access to the network. It can act as a super-based machine and provide a level of security. It is integrated more easily than other vendors.
View full review »If a machine becomes infected by a user accessing the web, ForeScout has the ability to immediately quarantine that machine, isolating it from the network. Before this, someone would literally have to run down the hall and shut off a machine in the event of a breach and infection by malware.
View full review »AN
reviewer1735683
Instrutor at a tech services company with 1,001-5,000 employees
Forescout Platform provides continuous security monitoring and mitigation.
View full review »ForeScout has given us the ability to block unwanted devices.
View full review »MS
Miguel Santiago
Owner at Securnet
We are really adapted to the product. So we find it perfect.
View full review »AM
Anestis Mantzouranis
Founder at EME Pty Ltd
This product allows monitoring and control of the PC fleet across the company.
View full review »As a distributor's engineer working on CounterACT, there are a few vast changes that I have seen after deploying CounterACT for our customers. A few of our customers reportedly had an easier time with their auditors on endpoint compliance, where they would only need to generate and turn in CounterACT's report. This saves both the customer's and the auditor's time.
Another improvement that we can see is automated security, where the customers would not need to manually turn on and off the switch ports for their guests. CounterACT automatically recognizes these guest and provides a self-registration feature to their guest while still maintaining the customer's network security posture.
View full review »We were searching for a solution that could help us not only to detect and manage unauthorized access, but also to implement 802.1x on our infrastructure. And when we were working to reach that goal, we found other improvements from using CounterACT, such as antivirus installation, P2P control, and shadow IT -- and that's another plus for them.
View full review »With the use of the NAC solution from ForeScout, the company was able to defend against unauthorized access to the network, thereby thoroughly distinguishing who is a Corporate user and who is a Guest. Process for Guest Registration (if implemented properly) was also easy.
View full review »RM
Ricardo Martins
Network System Administrator at Compugraf
The visibility is the main benefit. We now know how many devices are connected, what the use for each device is and what kind of devices we have in our environment.
View full review »OI
Olugbenro Iluyemi MSOR, CCNA-Security, SENSS, ITIL V3
Network and Security Engineer at Guaranty Trust Bank Plc (GTBank)
Identifying issues on why some hosts are not on the network, and assisting with possible remediation options.
View full review »Since my company is a systems integrator, we have ForeScout CounterACT in our lab just to test or troubleshoot customer configurations.
You can query a lot of information from the connected device, including their compliance statuses.
View full review »Since our implementation of CounterACT, it has kept us aware of unapproved devices attempting to connect to our network which pose security threats.
View full review »The bank has been able to manage host connection on the network, manage antivirus, and restrict the use of USB on the bank’s systems.
View full review »We are provided with real-time visibility and control of devices accessing our network.
View full review »Buyer's Guide
Forescout Platform
March 2024
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.