Forescout Platform Primary Use Case

SecEng3904
Senior Security Engineer at a healthcare company with 10,001+ employees
Asset Discovery. We were not able to accurately see devices in our network and/or have the ability to either remove rogue devices from the network or move them off to another VLAN. With corporate owned assets, we also have the ability to see if something is missing or not up-to-date on a product, then we have the ability to push the update down to the asset. We have not integrated the wireless access points into the product, but we are able to gain better visibility with wireless access points for mobile devices to do the same thing. View full review »
reviewer1348908
Senior Network Engineer at Tessy Plastics
We primary use the Forescout appliances to identify, segment, and control all of our internal, manufacturing, automation, and IoT networks. In addition, we use Forescout to deploy guest wireless by utilizing self-registration to allow employees and guests onto our network. Forescout is also responsible for maintaining and showing us all threat data, such as vulnerabilities. We also use it to identify and prevent all malicious network scans throughout our entire network. These powerful tools allow us to secure our network end-to-end. View full review »
Avraham Sonenthal
Senior Network Engineer at a government with 5,001-10,000 employees
We are using this product as a NAC to secure our network and to meet IRS audit requirements. For example, we are using it to lock down our VPN solution. Until now we had strict requirements for people logging in through VPN, including AD credentials and multifactor authentication, but no requirements for the actual hardware they were using. With Forescout, we can inspect every computer using VPN and block ones we don't permit, or remediate the ones we do permit. Also, we will be able to quarantine and block computers that are not agency equipment on regular switch ports or wireless. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,141 professionals have used our research since 2012.
reviewer1363347
Product Manager - IT Security at a tech services company with 11-50 employees
Our primary use case is for device compliance and access control. View full review »
reviewer1348911
Sr. Network Engineer at William Blair & Company
To be able to improve security within our network. We needed Network Access Control (NAC). As such, we reviewed the available vendors who could provide this service to us and selected the Forescout CounterACT (CA) product primarily because we needed to be able to position the product in several regional locations. At the same time, we managed and controlled it locally and dynamically where we have it responding to a single control center. While we have implemented today strictly for wireless access, we will be extending that to include wired access in the future. View full review »
Miguel Santiago
Owner at Securnet
We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout. View full review »
reviewer1155042
Chief Information Security Officer at a tech services company with 501-1,000 employees
We've been able to use the solution for a couple of tasks including using it to monitor for anti-virus compliance. We also use it to monitor the health of the security history of our endpoints. View full review »
RobertoMarinozzi
System Engineer at Maticmind S.p.A.
In both the environment I have used CounterACT to permit guests access and recognize automatically domain/white list members View full review »
Dilan Jayamantri
Product Manager at South Asian Technologies
We're Forescout partners and offer this as a solution to our clients. View full review »
reviewer1416408
GM Technical Management at a tech services company with 201-500 employees
We are a solution provider and we are currently implementing this product for our customers. One of the reasons we use Forescout is to differentiate between our employees and guests in the office. For employees, we want to make sure that all of the Wi-Fi devices connected to our infrastructure comply with our security regulations. For guests, or for subcontractors, our goal is to monitor and regulate access. This also provides us with the ability to use automation during our compliance and review. For example, we can automate processes with third-party solutions such as Splunk, or our own firewall can have an automatic response based on the compliance results from Forescout. View full review »
Surodas Deb Roy
Chief Technology Officer at Penta Global Limited
Right now, we are looking to implement the solution in a hospital where a lot of people come to the lobby and are outsiders or guests. The VOD and guests' mobile phones will be able to connect to the Wi-Fi. This is the latest use case we are working on. View full review »
Adesoji
Head IT Infrastructure and Security at United Capital Plc
My company is in the financial services industry. The primary use case is Network Access Control and control endpoint access to network. The environment is used to process sensitive data. We want to ensure that rogue devices and unauthorized devices are unable to join the network. This will reduce our exposure to attacks. View full review »
reviewer1297917
Chief Executive Officer at a tech services company with 11-50 employees
To find out what devices are in the network for our clients. We manage client's networks, so we have it on the client's network and they use it so they can make sure they know who's on the network and if it's secure. View full review »
Odai Halawani
Sr. Security Engineer at Topvision
We use the Forescout Platform to manage all of the devices connected to our network. View full review »
Olugbenro Iluyemi MSOR, CCNA-Security, SENSS, ITIL V3
Network and Security Engineer at Guaranty Trust Bank Plc (GTBank)
Primarily used to define which host to admit onto the network, by tying a policy to the MAC address. View full review »
reviewer1259856
Director of Information Technology at a government with 201-500 employees
We needed this solution in order to block rogue devices (laptops, phones, etc) and block external devices. View full review »
Anestis Mantzouranis
Founder at EME Pty Ltd
We use this solution for Network Access Control to prevent rogue devices connecting into the network. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
442,141 professionals have used our research since 2012.