Forescout Platform works as our next-gen solution, helping us monitor and manage devices connected or disconnected from the network. Additionally, it assists in remediating noncompliant devices.
Our primary use of the Forescout Platform is to enhance network security. It is deployed in an on-premises environment, although there is interest in exploring cloud-based solutions.
The product is used especially in scenarios where you have an abandoned server that did not have any updates or any security updates or a stable operating system, owing to which you had to shut it down in your environment. If, somehow, somebody tries to switch on an abandoned server, Forescout will check if the operating system and antivirus are updated or not, and if they are not, then it will immediately disconnect such a server from the network and isolate it.
Senior Tech Consultant at Ministry of Finance, UAE
Consultant
Top 20
2024-03-29T13:29:34Z
Mar 29, 2024
We have two main use cases: wired networks and wireless networks. In the wireless scenario, our main focus is on authenticating users to ensure compliance before granting access to our private network.
Head IT Infrastructure and Security at United Capital Plc
Real User
2020-05-19T18:28:00Z
May 19, 2020
My company is in the financial services industry. The primary use case is Network Access Control and control endpoint access to network. The environment is used to process sensitive data. We want to ensure that rogue devices and unauthorized devices are unable to join the network. This will reduce our exposure to attacks.
Senior Security Engineer at a healthcare company with 10,001+ employees
Real User
2020-05-13T13:50:00Z
May 13, 2020
Asset Discovery. We were not able to accurately see devices in our network and/or have the ability to either remove rogue devices from the network or move them off to another VLAN. With corporate owned assets, we also have the ability to see if something is missing or not up-to-date on a product, then we have the ability to push the update down to the asset. We have not integrated the wireless access points into the product, but we are able to gain better visibility with wireless access points for mobile devices to do the same thing.
Service Line Manager (Service Operations Expert) - Network Access Control at a pharma/biotech company with 10,001+ employees
Real User
Top 10
2022-08-11T16:32:46Z
Aug 11, 2022
We use the Forescout Platform for radius authentication, as well as visibility control and enforcement. Such as discovery, classification, control, and orchestration for all possible use cases.
Mostly, I use this solution for endpoint compliance, antivirus updates to block malicious traffic access to the internal network, and for visibility, to see who is connected to the network and the infrastructure.
Director, International IT Infrastructure Support & Information Security at a manufacturing company with 1,001-5,000 employees
Real User
2022-07-13T14:47:26Z
Jul 13, 2022
I had to gain visibility across my network and be able to block any unknown device connected to my network and this is what I use Forescout Platform for.
Senior Advisor/Architect at a consultancy with 51-200 employees
Real User
2022-04-27T11:58:44Z
Apr 27, 2022
Our primary use case of this solution was to control which of our devices were connected to the network. I'm a senior architect advisor. We were customers of Forescout.
This solution can be used to organize guest portals, integrate switches, and create policies. Some of its standard use cases also include completing key process upgrades and anti-virus of Windows OS.
Forescout Platform can be deployed on the cloud or on-premise. When we have a large enterprise environment with a lot of users, different security policies are to be applied in certain situations and locations. This is where the Forescout Platform is used. If we have some compliance requirements to have the NAC solution in place, we prefer the Forescout Platform over other solutions.
Consultant at a tech services company with 51-200 employees
Consultant
2021-12-24T09:31:00Z
Dec 24, 2021
The use case is for a compliance check for the users who get into your organization. We identify the host for Windows PC, Mac, Linux, and servers. These are some of the use cases for user control and policy management. Some of the other use cases are to kill some applications and peer-to-peer applications. It's mainly for visibility and control, and we also integrate with various firewalls and other system security solutions. For example, LogRhythm, Splunk, Qreader, McAfee Orchestrator, and Trend Micro. I work on multiple technologies and security technology. The solution is deployed on-premise. We don't use it for our own company. We are the system integrators and we deploy for various customers across the region we work with and we deploy most of the verticals.
Senior Network Engineer at a government with 5,001-10,000 employees
Real User
2020-09-18T14:27:00Z
Sep 18, 2020
We are using this product as a NAC to secure our network and to meet IRS audit requirements. For example, we are using it to lock down our VPN solution. Until now we had strict requirements for people logging in through VPN, including AD credentials and multifactor authentication, but no requirements for the actual hardware they were using. With Forescout, we can inspect every computer using VPN and block ones we don't permit, or remediate the ones we do permit. Also, we will be able to quarantine and block computers that are not agency equipment on regular switch ports or wireless.
We are a solution provider and we are currently implementing this product for our customers. One of the reasons we use Forescout is to differentiate between our employees and guests in the office. For employees, we want to make sure that all of the Wi-Fi devices connected to our infrastructure comply with our security regulations. For guests, or for subcontractors, our goal is to monitor and regulate access. This also provides us with the ability to use automation during our compliance and review. For example, we can automate processes with third-party solutions such as Splunk, or our own firewall can have an automatic response based on the compliance results from Forescout.
We primary use the Forescout appliances to identify, segment, and control all of our internal, manufacturing, automation, and IoT networks. In addition, we use Forescout to deploy guest wireless by utilizing self-registration to allow employees and guests onto our network. Forescout is also responsible for maintaining and showing us all threat data, such as vulnerabilities. We also use it to identify and prevent all malicious network scans throughout our entire network. These powerful tools allow us to secure our network end-to-end.
Sr. Network Engineer at William Blair & Company
Real User
2020-05-12T16:02:00Z
May 12, 2020
To be able to improve security within our network. We needed Network Access Control (NAC). As such, we reviewed the available vendors who could provide this service to us and selected the Forescout CounterACT (CA) product primarily because we needed to be able to position the product in several regional locations. At the same time, we managed and controlled it locally and dynamically where we have it responding to a single control center. While we have implemented today strictly for wireless access, we will be extending that to include wired access in the future.
To find out what devices are in the network for our clients. We manage client's networks, so we have it on the client's network and they use it so they can make sure they know who's on the network and if it's secure.
Right now, we are looking to implement the solution in a hospital where a lot of people come to the lobby and are outsiders or guests. The VOD and guests' mobile phones will be able to connect to the Wi-Fi. This is the latest use case we are working on.
We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout.
Chief Information Security Officer at a tech services company with 501-1,000 employees
Real User
2020-02-20T06:38:06Z
Feb 20, 2020
We've been able to use the solution for a couple of tasks including using it to monitor for anti-virus compliance. We also use it to monitor the health of the security history of our endpoints.
Head of Network and Communication Department at TÜV SÜD
Vendor
2018-10-16T19:26:00Z
Oct 16, 2018
Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.
Forescout Platform provides today’s busy enterprise organizations with policy and protocol management, workflow coordination, streamlining, and complete device and infrastructure visibility to improve overall network security. The solution also provides concise real-time intelligence of all devices and users on the network. Policy and protocols are delineated using gathered intelligence to facilitate the appropriate levels of remediation, compliance, network access, and all service...
We use the tool for security in the banking and insurance industry.
Forescout Platform works as our next-gen solution, helping us monitor and manage devices connected or disconnected from the network. Additionally, it assists in remediating noncompliant devices.
Our primary use of the Forescout Platform is to enhance network security. It is deployed in an on-premises environment, although there is interest in exploring cloud-based solutions.
The product is used especially in scenarios where you have an abandoned server that did not have any updates or any security updates or a stable operating system, owing to which you had to shut it down in your environment. If, somehow, somebody tries to switch on an abandoned server, Forescout will check if the operating system and antivirus are updated or not, and if they are not, then it will immediately disconnect such a server from the network and isolate it.
We have two main use cases: wired networks and wireless networks. In the wireless scenario, our main focus is on authenticating users to ensure compliance before granting access to our private network.
I use the Forescout Platform for different customers from the enterprise, banking, and telecom sectors.
It enhances cybersecurity by allowing us to monitor and manage all connected devices on our network.
We're a financial institution with about 30,000 users.
I primarily use Forescout Platform for its wireless functionality, predictive functionality, and NetFlow feature.
I am using the Forescout Platform for access control, a central management dashboard of all endpoints, and blocking.
Our primary use cases of Forescout Platform are network access control, user access control, and Wi-Fi network access control.
My company is in the financial services industry. The primary use case is Network Access Control and control endpoint access to network. The environment is used to process sensitive data. We want to ensure that rogue devices and unauthorized devices are unable to join the network. This will reduce our exposure to attacks.
Asset Discovery. We were not able to accurately see devices in our network and/or have the ability to either remove rogue devices from the network or move them off to another VLAN. With corporate owned assets, we also have the ability to see if something is missing or not up-to-date on a product, then we have the ability to push the update down to the asset. We have not integrated the wireless access points into the product, but we are able to gain better visibility with wireless access points for mobile devices to do the same thing.
We use it to enforce maintenance tasking orders or time compliance network orders that are passed down.
This solution ensures that every endpoint is compliant.
We use this solution for cyber-security purposes.
I use Forescout Platform in the construction industry to monitor connections to our cloud for ERP and file services.
We use the Forescout Platform for radius authentication, as well as visibility control and enforcement. Such as discovery, classification, control, and orchestration for all possible use cases.
We use this solution to implement compliance on our client's systems and prevent access from outside the organization.
Mostly, I use this solution for endpoint compliance, antivirus updates to block malicious traffic access to the internal network, and for visibility, to see who is connected to the network and the infrastructure.
I had to gain visibility across my network and be able to block any unknown device connected to my network and this is what I use Forescout Platform for.
It's a Network Access Control tool.
We use the Forescout Platform primarily for asset management.
We are using the Forescout Platform for controlling the access to the network for devices.
Our primary use case of this solution was to control which of our devices were connected to the network. I'm a senior architect advisor. We were customers of Forescout.
This solution can be used to organize guest portals, integrate switches, and create policies. Some of its standard use cases also include completing key process upgrades and anti-virus of Windows OS.
Forescout Platform can be deployed on the cloud or on-premise. When we have a large enterprise environment with a lot of users, different security policies are to be applied in certain situations and locations. This is where the Forescout Platform is used. If we have some compliance requirements to have the NAC solution in place, we prefer the Forescout Platform over other solutions.
The use case is for a compliance check for the users who get into your organization. We identify the host for Windows PC, Mac, Linux, and servers. These are some of the use cases for user control and policy management. Some of the other use cases are to kill some applications and peer-to-peer applications. It's mainly for visibility and control, and we also integrate with various firewalls and other system security solutions. For example, LogRhythm, Splunk, Qreader, McAfee Orchestrator, and Trend Micro. I work on multiple technologies and security technology. The solution is deployed on-premise. We don't use it for our own company. We are the system integrators and we deploy for various customers across the region we work with and we deploy most of the verticals.
We are using the Forescout Platform for authentication and for 100% device visibility.
I am a freelance cybersecurity consultant. I provide and implement products for our clients.
We needed some protection in our environment. We use this product in some areas in our network to monitor the security of the endpoints of our users.
We are using this product as a NAC to secure our network and to meet IRS audit requirements. For example, we are using it to lock down our VPN solution. Until now we had strict requirements for people logging in through VPN, including AD credentials and multifactor authentication, but no requirements for the actual hardware they were using. With Forescout, we can inspect every computer using VPN and block ones we don't permit, or remediate the ones we do permit. Also, we will be able to quarantine and block computers that are not agency equipment on regular switch ports or wireless.
We are a solution provider and we are currently implementing this product for our customers. One of the reasons we use Forescout is to differentiate between our employees and guests in the office. For employees, we want to make sure that all of the Wi-Fi devices connected to our infrastructure comply with our security regulations. For guests, or for subcontractors, our goal is to monitor and regulate access. This also provides us with the ability to use automation during our compliance and review. For example, we can automate processes with third-party solutions such as Splunk, or our own firewall can have an automatic response based on the compliance results from Forescout.
We're Forescout partners and offer this as a solution to our clients.
Our primary use case is for device compliance and access control.
We use the Forescout Platform to manage all of the devices connected to our network.
We primary use the Forescout appliances to identify, segment, and control all of our internal, manufacturing, automation, and IoT networks. In addition, we use Forescout to deploy guest wireless by utilizing self-registration to allow employees and guests onto our network. Forescout is also responsible for maintaining and showing us all threat data, such as vulnerabilities. We also use it to identify and prevent all malicious network scans throughout our entire network. These powerful tools allow us to secure our network end-to-end.
To be able to improve security within our network. We needed Network Access Control (NAC). As such, we reviewed the available vendors who could provide this service to us and selected the Forescout CounterACT (CA) product primarily because we needed to be able to position the product in several regional locations. At the same time, we managed and controlled it locally and dynamically where we have it responding to a single control center. While we have implemented today strictly for wireless access, we will be extending that to include wired access in the future.
To find out what devices are in the network for our clients. We manage client's networks, so we have it on the client's network and they use it so they can make sure they know who's on the network and if it's secure.
Right now, we are looking to implement the solution in a hospital where a lot of people come to the lobby and are outsiders or guests. The VOD and guests' mobile phones will be able to connect to the Wi-Fi. This is the latest use case we are working on.
We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout.
We've been able to use the solution for a couple of tasks including using it to monitor for anti-virus compliance. We also use it to monitor the health of the security history of our endpoints.
We needed this solution in order to block rogue devices (laptops, phones, etc) and block external devices.
In both the environment I have used CounterACT to permit guests access and recognize automatically domain/white list members
We use this solution for Network Access Control to prevent rogue devices connecting into the network.
Primarily used to define which host to admit onto the network, by tying a policy to the MAC address.
Obtaining visibility into the network and connected devices is very simple with this tool. It takes me three minutes to do a base deployment when all the parameters are available.