What do you like most about Forescout Platform?
Thanks for sharing your thoughts with the community!
It has helped with improving our security posture in terms of controlling the access of rogue devices into our network through identification. We have been able to prevent rogue device activities on the network, check the health of the system, and ensure remediation.
Being able to sort on device types or devices with open ports is helpful when narrowing down assets of possible misconfigured devices that may be vulnerable on the network. We can take action on those devices based off of corporate policy.
Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security.
Forescout CounterACT has allowed us to better open our access and control wireless access globally from our HQ. This allows us to monitor the network access for every office globally. This has improved overall security, reducing risk and opening up the opportunity to provide greater end user flexibility.
We really like that we get full visibility of devices in the local network.
It allows for good detection of all the vendor products we have on-site.
We think it's simple. We think it's very useful and we really like reports and everything.
The user interface is quite simple.
The most valuable feature is the blocking of USB devices.
I have noticed that in the last year the license model has changed from licensing the whole appliance to licensing the number of devices. It's more simple for a large installation, or a user to have CounterACT as their peripheral site in the company. It's a good choice to have changed the license policy.
The most valuable features are remote access and administration scripts.
The visibility is the main benefit. We now know how many devices are connected, what the use for each device is and what kind of devices we have in our environment.
Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.
Emergency response, risk assessment information to get a view of the of the vulnerability.