Forescout Platform Valuable Features

SecEng3904
Senior Security Engineer at a healthcare company with 10,001+ employees
There are so many to list: * The policies and what you can do with them is amazing. * The ability to narrow down devices online versus offline. * Get the MAC Addresses last attributed with a device or IP address on a device and connect that to its switch port or router. This is very beneficial when assisting in tracing back physical connectivity, if needed. * The ability to move a device off the network is very useful. The hardest part is showing the help desk what they need to do when troubleshooting a device connectivity issue. View full review »
Jonathan Soto
Ingeniero Senior en seguridad y telecomunicaciones at a non-tech company with 1,001-5,000 employees
The environment was easy to configure. The user management has been very easy for the most part. The initial setup is pretty easy. Technical support has been very helpful. The stability overall is good. View full review »
reviewer1348908
Senior Network Engineer at Tessy Plastics
The biggest benefit to our organization is the fact that being in manufacturing you have many different types of devices. Only a small section of these types of devices support dot1x authentication. This makes Network Access Control very difficult to implement. With Forescout, the difficulty becomes significantly less. Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: March 2021.
465,891 professionals have used our research since 2012.
Avraham Sonenthal
Senior Network Engineer at a government with 5,001-10,000 employees
I think the most valuable feature is that the port-based 802.1x configuration on switch ports is not required. It operates by listening to the wire and talking to networking devices. That is a huge reduction in configuration complexity. You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as. Another good thing about the product that it can examine every endpoint and give information about it, even IoT devices. View full review »
reviewer1363347
Product Manager - IT Security at a tech services company with 11-50 employees
Its feature that I have found most valuable is that it is very granular. You can configure granular controls just as you want those policies to be implemented. It gives you that flexibility to go granular in how you want your controls to be implemented. That's something I like about it. The pricing, technical support, stability, scalability, initial set up, interface, dashboards, management, and monitoring are fantastic. They are excellent. The licensing of the solution is pretty simple. The process of deploying the solution is pretty straightforward. The dashboard, in terms of monitoring and management, is pretty simple. Maybe because I have a very robust technological background is why I don't struggle with these things. In terms of management, deployment, and support, although I really don't require their support, so far, so good. View full review »
reviewer1348911
Sr. Network Engineer at William Blair & Company
The key feature we use is AD integration. That feature needs the least amount of attention once set up. Monitoring and logging are the pieces that we use most day-to-day. These are used by both our network and security teams to ensure proper operation with minimal risk. Whether machines attempting access are firm managed, vendors visiting, or IoT, all are available within the CA appliance. We plan to extend the use to further support growth functionalities and new work from home initiatives going forward. View full review »
Miguel Santiago
Owner at Securnet
Now that I'm used to it I don't see many places to improve it. We really like it as it is. We think it's simple. We think it's very useful and we really like reports and everything. We like it very much. View full review »
reviewer1155042
Chief Information Security Officer at a tech services company with 501-1,000 employees
It's a great solution. We use it for the internet here and it's been helpful. It's a great product for our Mac PCs and we can implement it to both our wireless and our wired network. It's very quick. The compliance aspects of the solution are excellent and one of the solution's best features. It helps us maintain the compliance of our endpoints. In terms of physical tools, we are very satisfied. In our organization, the solution provides us with a sound perimeter. The user interface is quite simple. The version we're currently on, 8.6, has a lot more plugins than past versions. Now you can plug in anything you want. It helps us to utilize the product more fully. View full review »
RobertoMarinozzi
System Engineer at Maticmind S.p.A.
The last two or three versions that have been released on CounterACT Forescout have allowed for the possibility to search for any kind of device. Before that, I could only search for guest domain users. View full review »
Dilan Jayamantri
Product Manager at South Asian Technologies
The solution's most valuable aspects are its network visibility and its ability to extend into other solutions for integration purposes. The initial setup is quite simple. It's not too complex or difficult to set up. View full review »
reviewer1416408
GM Technical Management at a tech services company with 201-500 employees
The most valuable feature is the ease of deployment, which does not require the use of an agent. We are satisfied with the interface. View full review »
Surodas Deb Roy
Chief Technology Officer at Penta Global Limited
The solution offers very good management. It allows for good detection of all the vendor products we have on-site. The solution is very similar to other solutions, so it's not hard to figure out how to use it. View full review »
Adesoji
Head IT Infrastructure and Security at United Capital Plc
Access control: Being able to set policies that determine how devices join our network and how they are expected to behave while on the network. The fact that we are able to access the hygiene of our endpoint and monitor it continuously makes it fit for purpose. View full review »
reviewer1297917
Chief Executive Officer at a tech services company with 11-50 employees
We really like that we get full visibility of devices in the local network. View full review »
Odai Halawani
Sr. Security Engineer at Topvision
The interface is easy to use. The 802.1X configuration, which is difficult for all switches, is not required. It makes it easier to work with switches and IoT devices. View full review »
reviewer1259856
Director of Information Technology at a government with 201-500 employees
The most valuable feature is the blocking of USB devices. View full review »
Anestis Mantzouranis
Founder at EME Pty Ltd
The most valuable features are remote access and administration scripts. View full review »
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: March 2021.
465,891 professionals have used our research since 2012.