TrustRadius
CounterACT is network access control software from ForeScout Technologies in Campbell, California.CounterAct is the Swiss army knife of network securityCounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.,Ensure authorized devices only connect to our network Guest registration Endpoint visibility,Thick client UI could use some updates to be web based,10,ForeScout has automated the detection of rogue devices ForeScout has enabled us to get a get a better understanding of endpoint compliance,Cisco ISE,Splunk Enterprise, Skyhigh Cloud Access Security BrokerCounterACT - Blocking the Bad Guys!Forescout CounterAct is being used by the IT department. The main reason behind the purchase of Forescout was for Network Access Control. We wanted to make sure any device connected to our network that was not property of our company to be segregated off our company network and pushed directly to a separate network with only internet access.,Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them. The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network. Policies can be very intricate.,Policies ability to be very intricate also adds complexity to the building of the policy. Initial configuration is complex Uses SMB1 which is a vulnerable version - needs to be updated asap.,8,It has proven very effective at blocking rogue, non-company owned devices from gaining access to our network. It has provided security to a deeper level. Auditors have acknowledged very tight security with the addition of CounterACT.,Aruba Clearpass,CommVault, Proofpoint Enterprise Privacy
Unspecified
ForeScout CounterACT
3 Ratings
Score 9.5 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

ForeScout CounterACT Reviews

ForeScout CounterACT
3 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 9.5 out of 101
Show Filters 
Hide Filters 
Filter 3 vetted ForeScout CounterACT reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role
Reviews (1-2 of 2)
  Vendors can't alter or remove reviews. Here's why.
Mitchell Greenfield profile photo
January 16, 2018

ForeScout CounterACT Review: "CounterAct is the Swiss army knife of network security"

Score 10 out of 10
Vetted Review
Verified User
Review Source
CounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.
  • Ensure authorized devices only connect to our network
  • Guest registration
  • Endpoint visibility
  • Thick client UI could use some updates to be web based
ForeScout is great on a network where you have authorized assets are able to authenticate to them. If you have a mixed environment where you can't authenticate to devices it is probably less appropriate.
Read Mitchell Greenfield's full review
No photo available
April 04, 2017

ForeScout CounterACT Review: "CounterACT - Blocking the Bad Guys!"

Score 8 out of 10
Vetted Review
Verified User
Review Source
Forescout CounterAct is being used by the IT department. The main reason behind the purchase of Forescout was for Network Access Control. We wanted to make sure any device connected to our network that was not property of our company to be segregated off our company network and pushed directly to a separate network with only internet access.
  • Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them.
  • The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network.
  • Policies can be very intricate.
  • Policies ability to be very intricate also adds complexity to the building of the policy.
  • Initial configuration is complex
  • Uses SMB1 which is a vulnerable version - needs to be updated asap.
ForeScout CounterACT is well suited for a company looking to strengthen their network security. It has allowed us to be confident that there is not a rogue device connecting directly into our network to gain access to company information. It may not be suitable to a company with a small IT department as it does require time up front to initially configure and on an on-going basis to manage.
Read this authenticated review

ForeScout CounterACT Scorecard Summary

About ForeScout CounterACT

CounterACT is network access control software from ForeScout Technologies in Campbell, California.

ForeScout CounterACT Technical Details

Operating Systems: Unspecified
Mobile Application:No