Senior Tech Consultant at Ministry of Finance, UAE
Consultant
Top 20
2024-03-29T13:29:34Z
Mar 29, 2024
We use the Forescout Platform for device visibility and control in our network. It's very helpful for tracking malicious or unusual activity. We use it to track which ports are open, which machines are running specific services, and to identify vulnerabilities. For example, there was a vulnerability related to SMB, and we could use the product to determine which machines inside our organization were allowing SMB traffic.
Enterprise Level Policy Manager at a government with 10,001+ employees
Real User
2022-11-09T16:27:11Z
Nov 9, 2022
Vulnerability remediation is valuable. We can narrow down a system and its properties. We can go granular on the properties of each endpoint, such as which operating system you're using.
The best parts of Forescout Platform are its orchestration features, discovery capabilities, classification buckets, and flexibility in creating policies.
Consultant at a tech services company with 51-200 employees
Consultant
2021-12-24T09:31:00Z
Dec 24, 2021
Within three or four days, we have complete visibility of your infrastructure on the network. Compared to other solutions, the deployment of the solution is easier and we can close the project quickly.
I can integrate Forescout with products from multiple vendors in my environment, and also, the integration is searchable. It can be used with 802.1X and non-802.1X to integrate with my existing network. I don't need to upgrade any existing networks in my system, and I don't need to replace existing devices to integrate with Forescout. I find value in not having to spend money upgrading existing devices and networks.
This solution can be used to organize guest portals, integrate switches, and create policies. Some of its standard use cases also include completing key process upgrades and anti-virus of Windows OS.
Forescout Platform's most valuable features are that it is very granular. We are able to cull out a lot of information about our particular device or endpoint. The configuration and the visibility are very seamless. Overall the solution is very easy to handle and it's very comprehensive.
Technical Consultant at a tech services company with 11-50 employees
Consultant
2021-12-09T23:51:19Z
Dec 9, 2021
Forescout Platform provides multiple features. They have a very effective device fingerprinting in their cloud. You do not need to add any devices manually, such as in Mac devices. Other solutions you have to add IoT devices and OT devices manually. This is one of the major areas that Forescout Platform is excelling in.
Senior Network Engineer at a government with 5,001-10,000 employees
Real User
2020-09-18T14:27:00Z
Sep 18, 2020
You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as.
Product Manager - IT Security at a tech services company with 11-50 employees
Real User
2020-08-12T07:01:00Z
Aug 12, 2020
Its feature that I have found most valuable is that it is very granular. You can configure granular controls just as you want those policies to be implemented. It gives you that flexibility to go granular in how you want your controls to be implemented. That's something I like about it.
Head IT Infrastructure and Security at United Capital Plc
Real User
2020-05-19T18:28:00Z
May 19, 2020
It has helped with improving our security posture in terms of controlling the access of rogue devices into our network through identification. We have been able to prevent rogue device activities on the network, check the health of the system, and ensure remediation.
Senior Security Engineer at a healthcare company with 10,001+ employees
Real User
2020-05-13T13:50:00Z
May 13, 2020
Being able to sort on device types or devices with open ports is helpful when narrowing down assets of possible misconfigured devices that may be vulnerable on the network. We can take action on those devices based off of corporate policy.
Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security.
Sr. Network Engineer at William Blair & Company
Real User
2020-05-12T16:02:00Z
May 12, 2020
Forescout CounterACT has allowed us to better open our access and control wireless access globally from our HQ. This allows us to monitor the network access for every office globally. This has improved overall security, reducing risk and opening up the opportunity to provide greater end user flexibility.
I have noticed that in the last year the license model has changed from licensing the whole appliance to licensing the number of devices. It's more simple for a large installation, or a user to have CounterACT as their peripheral site in the company. It's a good choice to have changed the license policy.
The visibility is the main benefit. We now know how many devices are connected, what the use for each device is and what kind of devices we have in our environment.
Head of Network and Communication Department at TÜV SÜD
Vendor
2018-10-16T19:26:00Z
Oct 16, 2018
Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.
Forescout Platform provides today’s busy enterprise organizations with policy and protocol management, workflow coordination, streamlining, and complete device and infrastructure visibility to improve overall network security. The solution also provides concise real-time intelligence of all devices and users on the network. Policy and protocols are delineated using gathered intelligence to facilitate the appropriate levels of remediation, compliance, network access, and all service...
We use the Forescout Platform for device visibility and control in our network. It's very helpful for tracking malicious or unusual activity. We use it to track which ports are open, which machines are running specific services, and to identify vulnerabilities. For example, there was a vulnerability related to SMB, and we could use the product to determine which machines inside our organization were allowing SMB traffic.
The solution's implementation and operation are very easy.
The standout strength of this solution lies in its unique capability to effectively manage unmanaged switches.
The product is very easy to work with and easy to deploy.
Forescout has a feature that blocks the endpoint at the point of collection. It sets preconditions and will block the system if those aren't met.
Forescout Platform's best feature is plug-in integration.
The most valuable feature of the Forescout Platform it's highly customizable and flexible.
Vulnerability remediation is valuable. We can narrow down a system and its properties. We can go granular on the properties of each endpoint, such as which operating system you're using.
The most valuable feature of Forescout Platform is that it has everything that Aruba has at significantly less cost.
Forescout is easy to integrate with a lot of end systems.
The threat prevention feature provides complete visibility.
The best parts of Forescout Platform are its orchestration features, discovery capabilities, classification buckets, and flexibility in creating policies.
The initial setup is easy, taking no more than two or three weeks.
Within three or four days, we have complete visibility of your infrastructure on the network. Compared to other solutions, the deployment of the solution is easier and we can close the project quickly.
The 802.1X compliance authentication feature of this solution is very good.
Forescout Platform has made it possible to block people working near our construction sites who should not have access to our network.
It is agentless and multivendor capable, also easy to manage.
The most valuable features of the Forescout Platform are NAC for sharing, Network Access Control, and port sharing of the devices.
This is clearly the best product for the NAC use cases in this field for Forescout.
I can integrate Forescout with products from multiple vendors in my environment, and also, the integration is searchable. It can be used with 802.1X and non-802.1X to integrate with my existing network. I don't need to upgrade any existing networks in my system, and I don't need to replace existing devices to integrate with Forescout. I find value in not having to spend money upgrading existing devices and networks.
The most valuable features of the Forescout Platform are ease of management and outstanding visibility. The visibility is simple to obtain.
The scalability is good.
It's one of the tools that has given the federal government visibility into network devices and everything.
Forescout Platform is stable, it is great.
Provides a good overview of all devices on a network.
This solution can be used to organize guest portals, integrate switches, and create policies. Some of its standard use cases also include completing key process upgrades and anti-virus of Windows OS.
The stability is amazing for the Forescout Platform. We have been using Forescout for four years, and no one complained about the stability.
Forescout Platform's most valuable features are that it is very granular. We are able to cull out a lot of information about our particular device or endpoint. The configuration and the visibility are very seamless. Overall the solution is very easy to handle and it's very comprehensive.
The most valuable feature of the Forescout Platform is the large capacity it can handle. Additionally, the interface of the platform is good.
Forescout Platform provides multiple features. They have a very effective device fingerprinting in their cloud. You do not need to add any devices manually, such as in Mac devices. Other solutions you have to add IoT devices and OT devices manually. This is one of the major areas that Forescout Platform is excelling in.
The actions that the agentless visibility, allow us to perform on the endpoint, are really amazing, especially in the way that it is done.
The user management has been very easy for the most part.
You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as.
The most valuable feature is the ease of deployment, which does not require the use of an agent.
The initial setup is quite simple. It's not too complex or difficult to set up.
Its feature that I have found most valuable is that it is very granular. You can configure granular controls just as you want those policies to be implemented. It gives you that flexibility to go granular in how you want your controls to be implemented. That's something I like about it.
The interface is easy to use.
It has helped with improving our security posture in terms of controlling the access of rogue devices into our network through identification. We have been able to prevent rogue device activities on the network, check the health of the system, and ensure remediation.
Being able to sort on device types or devices with open ports is helpful when narrowing down assets of possible misconfigured devices that may be vulnerable on the network. We can take action on those devices based off of corporate policy.
Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security.
Forescout CounterACT has allowed us to better open our access and control wireless access globally from our HQ. This allows us to monitor the network access for every office globally. This has improved overall security, reducing risk and opening up the opportunity to provide greater end user flexibility.
We really like that we get full visibility of devices in the local network.
It allows for good detection of all the vendor products we have on-site.
We think it's simple. We think it's very useful and we really like reports and everything.
The user interface is quite simple.
The most valuable feature is the blocking of USB devices.
I have noticed that in the last year the license model has changed from licensing the whole appliance to licensing the number of devices. It's more simple for a large installation, or a user to have CounterACT as their peripheral site in the company. It's a good choice to have changed the license policy.
The most valuable features are remote access and administration scripts.
The visibility is the main benefit. We now know how many devices are connected, what the use for each device is and what kind of devices we have in our environment.
Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.
Emergency response, risk assessment information to get a view of the of the vulnerability.