Likelihood to Recommend I strongly recommend using it in networks where many machines enter, it is essential to have a capture of all ids, mac etc to prevent and detect unauthorized machines.We are in the technological era and there is a lot of technological robotization looking for weak systems to enter.Invest in greater security and that does not happen to you.
Read full review It's very well suited for geographically dispersed organizations, where deploying and managing remote firewalls and other network security functions aren't practical. Once deployed, and the deployment isn't difficult after planning and understanding the data flows of the IoT devices, the system is easily managed and flexible. You're able to allow front line operations people to add devices into a role without sacrificing the integrity of the security model.
Read full review Pros Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them. The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network. Policies can be very intricate. Read full review Low capital and support cost structures. Ease of deployment. Ability to work over the existing network. Read full review Cons They should have more training for the versions of applications they update. It would be great if the GUI would be more aesthetic in appearance. Nothing else as the application is amazing. Read full review Integration with third-party security controls. Automating the on-boarding of devices. Reporting needs to be more detailed. Read full review Support Rating They are prompt in their response with a complete resolution once they have identified the problem. Other OEM's generally give stop-gap arrangements and then later come with new upgrade versions. This gives downtime tasks to customers often, which isn't appreciated. Given the criticality of this software, their support is prompt.
Read full review It's pretty darned good for a new company. We had to hash through a couple of instances that no one had ever run into, but once we got to the right person on the engineering team, they were able to work through the solution pretty quickly. The nice thing is, unlike Cisco, once you fix something, you don't find three new things that have to be changed.
Read full review Alternatives Considered Better intergration with patch management tools. Forescount Platfform (CounterAct) is easily compatible with diverse network infrastructure to offer better service and efficiently ensure seamless operations. Its automation capabilities have also enabled us to depend less on the operations teams hence saving time as it's faster and also saving the operational cost of having people around in case of threats.
Read full review The cost and complexity vs. ISE is as different as Uber and Lift are from trying to take a taxi in Duluth, Minnesota. The complexity of Cisco's IoT security is a joke. It was going to take us over a year just to deploy all the Cisco equipment, and that was if we could have gotten it all working together. We got the entire project deployed in just under 3 months, and that includes working out all the bugs and logistics. Honestly, I don't think all the Cisco parts would have ever been running like Cisco promised it would. It's just way too complicated.
Read full review Return on Investment We've managed to automate our cybersecurity to impressive extents, now the IT security team puts focus on more important things. We've attained successful assets risk mitigation for our clients. Read full review Capital cost to deploy was 1/4 the cost of doing Cisco. People and time frame to do the entire deployment was 1/12th the time/people to complete the installation. On-going management is being done without adding staff. Read full review ScreenShots