2018-10-16T19:26:00Z

What is your primary use case for Forescout Platform?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
1313 Answers

author avatar
Top 10Real User

My company is in the financial services industry. The primary use case is Network Access Control and control endpoint access to network. The environment is used to process sensitive data. We want to ensure that rogue devices and unauthorized devices are unable to join the network. This will reduce our exposure to attacks.

2020-05-19T18:28:00Z
author avatar
Top 5LeaderboardReal User

Asset Discovery. We were not able to accurately see devices in our network and/or have the ability to either remove rogue devices from the network or move them off to another VLAN. With corporate owned assets, we also have the ability to see if something is missing or not up-to-date on a product, then we have the ability to push the update down to the asset. We have not integrated the wireless access points into the product, but we are able to gain better visibility with wireless access points for mobile devices to do the same thing.

2020-05-13T13:50:00Z
author avatar
Top 10Real User

We primary use the Forescout appliances to identify, segment, and control all of our internal, manufacturing, automation, and IoT networks. In addition, we use Forescout to deploy guest wireless by utilizing self-registration to allow employees and guests onto our network. Forescout is also responsible for maintaining and showing us all threat data, such as vulnerabilities. We also use it to identify and prevent all malicious network scans throughout our entire network. These powerful tools allow us to secure our network end-to-end.

2020-05-12T16:20:00Z
author avatar
Top 5LeaderboardReal User

To be able to improve security within our network. We needed Network Access Control (NAC). As such, we reviewed the available vendors who could provide this service to us and selected the Forescout CounterACT (CA) product primarily because we needed to be able to position the product in several regional locations. At the same time, we managed and controlled it locally and dynamically where we have it responding to a single control center. While we have implemented today strictly for wireless access, we will be extending that to include wired access in the future.

2020-05-12T16:02:00Z
author avatar
Top 10Real User

To find out what devices are in the network for our clients. We manage client's networks, so we have it on the client's network and they use it so they can make sure they know who's on the network and if it's secure.

2020-03-08T10:06:00Z
author avatar
Top 10Real User

Right now, we are looking to implement the solution in a hospital where a lot of people come to the lobby and are outsiders or guests. The VOD and guests' mobile phones will be able to connect to the Wi-Fi. This is the latest use case we are working on.

2020-03-05T08:39:39Z
author avatar
Top 5LeaderboardReal User

We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout.

2020-03-03T08:47:00Z
author avatar
Top 5LeaderboardReal User

We've been able to use the solution for a couple of tasks including using it to monitor for anti-virus compliance. We also use it to monitor the health of the security history of our endpoints.

2020-02-20T06:38:06Z
author avatar
Top 20Real User

We needed this solution in order to block rogue devices (laptops, phones, etc) and block external devices.

2020-01-06T19:34:00Z
author avatar
Top 5LeaderboardReal User

In both the environment I have used CounterACT to permit guests access and recognize automatically domain/white list members

2019-11-28T11:33:00Z
author avatar
Top 20Real User

We use this solution for Network Access Control to prevent rogue devices connecting into the network.

2019-07-11T11:46:00Z
author avatar
Top 5LeaderboardReal User

Primarily used to define which host to admit onto the network, by tying a policy to the MAC address.

2018-11-21T13:32:00Z
author avatar
Top 20Consultant

Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.

2018-10-16T19:26:00Z
Learn what your peers think about Forescout Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
441,850 professionals have used our research since 2012.