TrustRadius: an HG Insights company

Forescout Platform Reviews and Ratings

Rating: 6.9 out of 10
Score
6.9 out of 10

Community insights

TrustRadius Insights for Forescout Platform are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Pros

Effective Network Visibility and Control: Reviewers have consistently praised Forescout Continuum for its ability to provide visibility and control over authorized devices connecting to their network. Multiple users have mentioned that this feature has enhanced network security by ensuring that only authorized devices are able to connect, ultimately helping to protect against potential threats.

Guest Registration Management: Many reviewers have found Forescout Continuum's guest registration feature to be easy to manage and monitor. This feature is highly effective in allowing for secure and controlled access for guests connecting to the network, providing an additional layer of security while maintaining network integrity.

Endpoint Visibility and Threat Detection: Several users have highlighted the benefits of Forescout Continuum's endpoint visibility capabilities. They appreciate being able to see which devices are connected to their system and having early detection for potential threats. This proactive approach allows them to take necessary measures in mitigating risks across all their Layer 2 networks.

Reviews

10 Reviews

Forescout Continuum Review

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We are giving greater triple layer security to our networks within the company, Forescout Continuum generates recent support for what we do at a programmatic level, the biggest challenge we had with the company was to be able to stabilize the knowledge of dangerous points that had to be vilndar to avoid intrusions from other networks, separate sectors so that departments of a site cannot enter files of others without authorization, Forescout Continuum has allowed us to learn more and solve more than enough.

Pros

  • Particularly, it helps us to examine vulnerable network points with an exhaustive audit, and with that audit we can generate strategic plans to improve failures, start screening with new programs according to departmental sectors or at the company level.
  • It generates continuous developments in the field of networks, we can control in this sense the income and expenses, blockades and also notifies us of dangerous situations within the company, generates reports and alerts an email in charge of the appropriate personnel through alarms.
  • What I liked the most is that it can generate separation of devices on PCs, mobiles, android and linux operating systems, it can generate separation in that sense and generate a very good order.
  • It gives us a holistic look at what has problems and what doesn't.

Cons

  • I refuse to speak badly about the software, it is a software in continuous development, I think it is one of the best we have had, in this sense, according to the needs for extra security in networks, the program is capable of leading several areas within the company and generates a good administration in network security.

Likelihood to Recommend

I strongly recommend using it in networks where many machines enter, it is essential to have a capture of all ids, mac etc to prevent and detect unauthorized machines.We are in the technological era and there is a lot of technological robotization looking for weak systems to enter.Invest in greater security and that does not happen to you.

Vetted Review
Forescout Platform
1 year of experience

A great compliance solution with an edge.

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We utilize its visibility capabilities to monitor and protect our network from unauthorized devices as it segregates rogue devices and ensures only company-owned assets are connected. Also it makes sure it can recognize what versions of applications are running on what devices at all times and mitigate risks that may come by.

Pros

  • Rogue devices detection and segregation.
  • Guests registrations.
  • Visibility of devices that are connected to our system.

Cons

  • They should have more training for the versions of applications they update.
  • It would be great if the GUI would be more aesthetic in appearance.
  • Nothing else as the application is amazing.

Likelihood to Recommend

It's quite a resourceful product especially when it comes to managing your compliance and visibility in the organization. Detection of threats and mitigating risks that may be involved with rogue devices accessing the company network. Your organization is able to tell what versions of applications are running on what devices and thus if updates or switching applications are needed they are up to the task.

A complete network access control solution

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

It has helped with protecting our organizations data from unauthorized devices that may try to connect to our network.

It has also enabled us in keeping separate devices not owned by the organization that connect to our network by putting them in a guest network where the guests registrations are signed by the employee they are visiting.

Pros

  • Great in monitoring what applications versions are running and on what devices.
  • Good identification of unmanaged devices and segregating them.
  • Endpoint visibility.

Cons

  • It can be quite complex in initial configurations.
  • Would be great if the GUI were more interactive.
  • Everything else works great.

Likelihood to Recommend

Works great in ensuring that only company owned assets are connected to the network and segregating those unauthorized devices by ensuring they connect to a separate guest network where the guests registrations are signed in by the employee they are visiting thus ensuring there are proper trails that can be followed incase of threats or anything else.

CounterACT is the best at prohibiting rogue access to networks.

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We have employed Forescout Platform counterACT to mainly provide visibility and automated control across all devices connected to our network. It verifies the compliance of the devices with our IT security and administrative mandate. Forescout Platform CounterACT prevents unauthorized devices from connecting into our network safeguarding our data and systems from any malicious activities from the outside.

Pros

  • Has a powerful network access control.
  • It automatically detects IOCs in network and segregates infected device.
  • It prohibits unauthorized device from connecting with our network and directs them to sign in us guests.

Cons

  • I would appreciate a more vibrant looking GUI.
  • rigid controls.

Likelihood to Recommend

It has straightforward integration with end point security platforms; for verifying devices compliance for endpoint guidelines. Its network access control allows us privileged visibility to devices on our network and only authorized devices can connect to our network. It is ideal for large scale IT companies that need to protect their networks from external attacks.

Vetted Review
Forescout Platform
4 years of experience

Effective mediation of Security threats.

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We procured Forescout Counteract to gain comprehensive 360-degree visibility of the assets that make up our digital architecture. We use it to view the connected assets' statuses and run assessments on them from time to time. We also utilize it extensively to automate security across both in-house IoT and IoMT for our healthcare-based clients. By gaining sufficient context of our digital assets ecosystem from the single Counteract UI, we can respond to security risks more effectively as opposed to independent monitoring.

Pros

  • Enables sharing of real-time device identity configuration and security details.
  • It triggers automated security responses if security issues arise.

Cons

  • The Forescout Policy Based Controls are inflexible, they may isolate assets while mediating threats at inconvenient moments.

Likelihood to Recommend

Forescout has been robust enough to mediate security threats on our IT ecosystem (servers for the most part) with impressive automation capabilities. It has resourceful risk scoring algorithms that prioritize critical assets for security protocols, unlike its competitors. It's suitable for the protection of your digital terrain despite the size by continuously running assessments that will go a long way in neutralizing the impact of security breaches. Forescout has however frustrated our teams with the policy-based controls- it isolates devices unnecessarily while eliminating threats.

Vetted Review
Forescout Platform
3 years of experience

Forescout Platform (CounterACT) Review

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

Forescout Platform (CounterACT) is able to discover and monitor wide range of asset inventory in the organization. Besides, it is also able to improve the workforce productivity and simplify the administration tasks. With the advanced automation feature, it also helps to reduce the operational and business risk significantly as it has eliminated any potential human errors.

Pros

  • Agentless deployment
  • Auto classification
  • Real time monitoring

Cons

  • Auto classification may not be accurate
  • Integration with other product can be complex
  • Required expertise for troubleshooting

Likelihood to Recommend

Forescount Platform (CounterACT) provides multiple active and passive monitoring techniques which can be very flexible. Integration with other third-party products such as Cisco ACI, AWS and others can be complex and may required expertise to facilitate. Besides, it is also capable to perform asset discovery for OT and IoT environments.

Vetted Review
Forescout Platform
1 year of experience

CounterACT the best central manage solution for NAC needs

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We use CounterACT to manage all other NAC across all our sites, and we used this for detection and mitigation on Layer 2 switches only at this time but the plan is to start to use it for remediations also!

Pros

  • Internal Early detections for threats
  • Mitigation across all our Layer 2 networks

Cons

  • Definitely Netflow V9 integration

Likelihood to Recommend

CounterACT is really good central management for NAC, easy to use but honestly little bit hard to customize but once you get this done is a really powerful tool

Complete Compliance Officer - Forescout NAC

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

Forescout CounterACT is used throughout the organization. Business problems it addresses are the compliance criteria of endpoints in organization. This is a mandatory requirement from regulatory bodies.

Pros

  • Complete visibility of devices connected in your network
  • Non-compliant system managed by Forescout can be controlled by restricting access
  • Implementation with heterogeneous network infrastructure
  • Windows level processes running on endpoints can be identified
  • Restrict non-corporate domain/guests systems connecting to network
  • Integration with patch management tools

Cons

  • Grow the Forescout community to help in addressing concern for a larger audience via channels
  • More training and demos for latest FS versions released
  • GUI can be made more interactive and aesthetic in appearance

Likelihood to Recommend

It is well suited in Banking industry and other enterprise companies where it is difficult to manage visibility and compliance in an organization. Telecom companies and IT companies also benefit a lot to get deeper into their network and stop the attack traversing in their network. Dashboards help management to get the complete picture and can be focused on concern points where there are a lot of non-domain systems, non-compliant systems, guests systems, etc.

CounterAct is the Swiss army knife of network security

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

CounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.

Pros

  • Ensure authorized devices only connect to our network
  • Guest registration
  • Endpoint visibility

Cons

  • Thick client UI could use some updates to be web based

Likelihood to Recommend

ForeScout is great on a network where you have authorized assets are able to authenticate to them. If you have a mixed environment where you can't authenticate to devices it is probably less appropriate.

CounterACT - Blocking the Bad Guys!

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

Forescout CounterAct is being used by the IT department. The main reason behind the purchase of Forescout was for Network Access Control. We wanted to make sure any device connected to our network that was not property of our company to be segregated off our company network and pushed directly to a separate network with only internet access.

Pros

  • Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them.
  • The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network.
  • Policies can be very intricate.

Cons

  • Policies ability to be very intricate also adds complexity to the building of the policy.
  • Initial configuration is complex
  • Uses SMB1 which is a vulnerable version - needs to be updated asap.

Likelihood to Recommend

ForeScout CounterACT is well suited for a company looking to strengthen their network security. It has allowed us to be confident that there is not a rogue device connecting directly into our network to gain access to company information. It may not be suitable to a company with a small IT department as it does require time up front to initially configure and on an on-going basis to manage.

Vetted Review
Forescout Platform
1 year of experience