About TrustRadius Scoring
Score 8.7 out of 100
Forescout Platform (CounterACT)


Recent Reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Forescout, and make your voice heard!


View all pricing

What is Forescout?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.…

Entry-level set up fee?

  • No setup fee


  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

2 people want pricing too

Alternatives Pricing

What is SolarWinds Engineer's Toolset?

SolarWinds® Engineer’s Toolset (ETS) helps users monitor and troubleshoot a network with over 60 tools for network management. ETS allows users to monitor and receive alerts in real time on network availability and health, and perform network diagnostics for faster troubleshooting and resolution of…

What is Twingate?

Twingate allows businesses to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT teams, and end users easier, it replaces outdated corporate VPNs which were not built to handle a world…

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Forescout?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with device intelligence, in order to allow organizations across every industry to classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets.

Forescout Video

Active defense for the Enterprise of Things. Don’t just see it. Secure it.

Forescout Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo


View all alternatives

Reviews and Ratings




(1-10 of 10)
Companies can't remove reviews or game the system. Here's why
Shirleen Muraya | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
It has helped with protecting our organizations data from unauthorized devices that may try to connect to our network.
It has also enabled us in keeping separate devices not owned by the organization that connect to our network by putting them in a guest network where the guests registrations are signed by the employee they are visiting.
  • Great in monitoring what applications versions are running and on what devices.
  • Good identification of unmanaged devices and segregating them.
  • Endpoint visibility.
  • It can be quite complex in initial configurations.
  • Would be great if the GUI were more interactive.
  • Everything else works great.
Works great in ensuring that only company owned assets are connected to the network and segregating those unauthorized devices by ensuring they connect to a separate guest network where the guests registrations are signed in by the employee they are visiting thus ensuring there are proper trails that can be followed incase of threats or anything else.
Candy Joey | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use it to monitor and ensure only authorized devices are connected to our network hence protecting our data from external threats.
It also helps ensure only company owned assets are able to connect.
It also helps when we have guest registrations that this are approved by employee they are visiting.
  • Guest registrations.
  • Monitoring what applications versions are running on what devices.
  • Restricted access of non compliant systems or devices.
  • More demos and training for newer versions released.
  • Can be quite complex in building of policy due to policies being complicated.
  • More interactive GUI would be helpful.
Wherever your organization is trying to protect and safeguard its data and assets from unauthorized access either use of devices that are not our company based or incases of guest they have to be approved by the employee they are visiting to ensure accountability incase of breaches or you need to refer to activities.
Score 9 out of 10
Vetted Review
Verified User
Review Source
We have employed Forescout Platform counterACT to mainly provide visibility and automated control across all devices connected to our network. It verifies the compliance of the devices with our IT security and administrative mandate. Forescout Platform CounterACT prevents unauthorized devices from connecting into our network safeguarding our data and systems from any malicious activities from the outside.
  • Has a powerful network access control.
  • It automatically detects IOCs in network and segregates infected device.
  • It prohibits unauthorized device from connecting with our network and directs them to sign in us guests.
  • I would appreciate a more vibrant looking GUI.
  • rigid controls.
It has straightforward integration with end point security platforms; for verifying devices compliance for endpoint guidelines. Its network access control allows us privileged visibility to devices on our network and only authorized devices can connect to our network. It is ideal for large scale IT companies that need to protect their networks from external attacks.
Score 8 out of 10
Vetted Review
Verified User
Review Source
We procured Forescout Counteract to gain comprehensive 360-degree visibility of the assets that make up our digital architecture. We use it to view the connected assets' statuses and run assessments on them from time to time. We also utilize it extensively to automate security across both in-house IoT and IoMT for our healthcare-based clients. By gaining sufficient context of our digital assets ecosystem from the single Counteract UI, we can respond to security risks more effectively as opposed to independent monitoring.
  • Enables sharing of real-time device identity configuration and security details.
  • It triggers automated security responses if security issues arise.
  • The Forescout Policy Based Controls are inflexible, they may isolate assets while mediating threats at inconvenient moments.
Forescout has been robust enough to mediate security threats on our IT ecosystem (servers for the most part) with impressive automation capabilities. It has resourceful risk scoring algorithms that prioritize critical assets for security protocols, unlike its competitors. It's suitable for the protection of your digital terrain despite the size by continuously running assessments that will go a long way in neutralizing the impact of security breaches. Forescout has however frustrated our teams with the policy-based controls- it isolates devices unnecessarily while eliminating threats.
Score 8 out of 10
Vetted Review
Verified User
Review Source
Forescout Platform provides many network and assets control that are very helpful for all IT staff from the techniciens to the network administrators and even the security team. Help to have full asset information visibility & tracking information. Forescout Platform overcome so many requirment that every organization needs like asset control, installed software, and many.
  • Asset Visibility
  • Full information overview
  • Network Control
  • User Interface
  • Easier way to configuration
  • Information can be provided more effective and better way
Discovering and managing assets. Give more network control and provide many features to have effective actions. Based on the configuration Forescout Platform can be very helpful to infrastructure especially over the network devices. More and better way to access the platform should be considered. Forescout Platform is very helpful for any medium and large infrastructure.
Score 9 out of 10
Vetted Review
Verified User
Review Source
Forescout Platform (CounterACT) is able to discover and monitor wide range of asset inventory in the organization. Besides, it is also able to improve the workforce productivity and simplify the administration tasks. With the advanced automation feature, it also helps to reduce the operational and business risk significantly as it has eliminated any potential human errors.
  • Agentless deployment
  • Auto classification
  • Real time monitoring
  • Auto classification may not be accurate
  • Integration with other product can be complex
  • Required expertise for troubleshooting
Forescount Platform (CounterACT) provides multiple active and passive monitoring techniques which can be very flexible. Integration with other third-party products such as Cisco ACI, AWS and others can be complex and may required expertise to facilitate. Besides, it is also capable to perform asset discovery for OT and IoT environments.
Eduardo Ramirez | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use CounterACT to manage all other NAC across all our sites, and we used this for detection and mitigation on Layer 2 switches only at this time but the plan is to start to use it for remediations also!
  • Internal Early detections for threats
  • Mitigation across all our Layer 2 networks
  • Definitely Netflow V9 integration
CounterACT is really good central management for NAC, easy to use but honestly little bit hard to customize but once you get this done is a really powerful tool
Score 9 out of 10
Vetted Review
Verified User
Review Source
Forescout CounterACT is used throughout the organization. Business problems it addresses are the compliance criteria of endpoints in organization. This is a mandatory requirement from regulatory bodies.
  • Complete visibility of devices connected in your network
  • Non-compliant system managed by Forescout can be controlled by restricting access
  • Implementation with heterogeneous network infrastructure
  • Windows level processes running on endpoints can be identified
  • Restrict non-corporate domain/guests systems connecting to network
  • Integration with patch management tools
  • Grow the Forescout community to help in addressing concern for a larger audience via channels
  • More training and demos for latest FS versions released
  • GUI can be made more interactive and aesthetic in appearance
It is well suited in Banking industry and other enterprise companies where it is difficult to manage visibility and compliance in an organization. Telecom companies and IT companies also benefit a lot to get deeper into their network and stop the attack traversing in their network. Dashboards help management to get the complete picture and can be focused on concern points where there are a lot of non-domain systems, non-compliant systems, guests systems, etc.
They are prompt in their response with a complete resolution once they have identified the problem. Other OEM's generally give stop-gap arrangements and then later come with new upgrade versions. This gives downtime tasks to customers often, which isn't appreciated. Given the criticality of this software, their support is prompt.
Mitchell Greenfield | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
CounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.
  • Ensure authorized devices only connect to our network
  • Guest registration
  • Endpoint visibility
  • Thick client UI could use some updates to be web based
ForeScout is great on a network where you have authorized assets are able to authenticate to them. If you have a mixed environment where you can't authenticate to devices it is probably less appropriate.
Score 8 out of 10
Vetted Review
Verified User
Review Source
Forescout CounterAct is being used by the IT department. The main reason behind the purchase of Forescout was for Network Access Control. We wanted to make sure any device connected to our network that was not property of our company to be segregated off our company network and pushed directly to a separate network with only internet access.
  • Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them.
  • The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network.
  • Policies can be very intricate.
  • Policies ability to be very intricate also adds complexity to the building of the policy.
  • Initial configuration is complex
  • Uses SMB1 which is a vulnerable version - needs to be updated asap.
ForeScout CounterACT is well suited for a company looking to strengthen their network security. It has allowed us to be confident that there is not a rogue device connecting directly into our network to gain access to company information. It may not be suitable to a company with a small IT department as it does require time up front to initially configure and on an on-going basis to manage.