Forescout Platform Valuable Features

SecEng3904
Senior Security Engineer at a marketing services firm with 1,001-5,000 employees
There are so many to list: * The policies and what you can do with them is amazing. * The ability to narrow down devices online versus offline. * Get the MAC Addresses last attributed with a device or IP address on a device and connect that to its switch port or router. This is very beneficial when assisting in tracing back physical connectivity, if needed. * The ability to move a device off the network is very useful. The hardest part is showing the help desk what they need to do when troubleshooting a device connectivity issue. View full review »
reviewer1348908
Senior Network Engineer at Tessy Plastics
The biggest benefit to our organization is the fact that being in manufacturing you have many different types of devices. Only a small section of these types of devices support dot1x authentication. This makes Network Access Control very difficult to implement. With Forescout, the difficulty becomes significantly less. Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security. View full review »
reviewer1348911
Sr. Network Engineer at William Blair & Company
The key feature we use is AD integration. That feature needs the least amount of attention once set up. Monitoring and logging are the pieces that we use most day-to-day. These are used by both our network and security teams to ensure proper operation with minimal risk. Whether machines attempting access are firm managed, vendors visiting, or IoT, all are available within the CA appliance. We plan to extend the use to further support growth functionalities and new work from home initiatives going forward. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
419,794 professionals have used our research since 2012.
Miguel Santiago
Owner at Securnet
Now that I'm used to it I don't see many places to improve it. We really like it as it is. We think it's simple. We think it's very useful and we really like reports and everything. We like it very much. View full review »
Michael Varga
IS-Operations Security Analyst at a energy/utilities company with 10,001+ employees
* Network Access Control, its core use * Asset Intelligence for deskside * "What port is it plugged into" intelligence for deskside * Patch-level Auditing * Emergency response, risk assessment information to get a view of the vulnerability * "What PC is a user on" for helpdesk/IT security/deskside * Forces PEN Testers to request permission to exist on your network View full review »
reviewer1155042
Chief Information Security Officer at a tech services company with 501-1,000 employees
It's a great solution. We use it for the internet here and it's been helpful. It's a great product for our Mac PCs and we can implement it to both our wireless and our wired network. It's very quick. The compliance aspects of the solution are excellent and one of the solution's best features. It helps us maintain the compliance of our endpoints. In terms of physical tools, we are very satisfied. In our organization, the solution provides us with a sound perimeter. The user interface is quite simple. The version we're currently on, 8.6, has a lot more plugins than past versions. Now you can plug in anything you want. It helps us to utilize the product more fully. View full review »
RobertoMarinozzi
System Engineer at Maticmind S.p.A.
The last two or three versions that have been released on CounterACT Forescout have allowed for the possibility to search for any kind of device. Before that, I could only search for guest domain users. View full review »
Surodas Deb Roy
Chief Technology Officer at Penta Global Limited
The solution offers very good management. It allows for good detection of all the vendor products we have on-site. The solution is very similar to other solutions, so it's not hard to figure out how to use it. View full review »
Adesoji
Head IT Infrastructure and Security at United Capital Plc
Access control: Being able to set policies that determine how devices join our network and how they are expected to behave while on the network. The fact that we are able to access the hygiene of our endpoint and monitor it continuously makes it fit for purpose. View full review »
reviewer1297917
Chief Executive Officer at a tech services company with 11-50 employees
We really like that we get full visibility of devices in the local network. View full review »
Ricardo Martins
Network System Administrator at Compugraf
I can create granular policies. This is amazing. I really appreciate the granularity to create policies. View full review »
Manuel Keller
Managing Consultant at a tech services company with 51-200 employees
Using passive and active methods to learn about the network. Even hybrid parts, like production, can be discovered with the passive method, while the office LAN can be discovered with both. View full review »
Olugbenro Iluyemi MSOR, CCNA-Security, SENSS, ITIL V3
Network and Security Engineer at Guaranty Trust Bank Plc (GTBank)
* SNMP Traps on switches * Getting the MAC address of the host from the ARP table of the switch and applying policy. View full review »
reviewer1259856
Director of Information Technology at a government with 201-500 employees
The most valuable feature is the blocking of USB devices. View full review »
Anestis Mantzouranis
Founder at EME Pty Ltd
The most valuable features are remote access and administration scripts. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
419,794 professionals have used our research since 2012.