Skip to main content
TrustRadius
Forescout Platform

Forescout Platform
Formerly CounterACT

Overview

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.…

Read more
Recent Reviews

TrustRadius Insights

Users have found that Forescout Continuum, specifically CounterAct, effectively safeguards their networks from unauthorized devices. By …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

8 people also want pricing

Alternatives Pricing

What is NordLayer?

NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best regulatory…

What is Twingate?

Twingate allows businesses to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT teams, and end users easier, it replaces outdated corporate VPNs which were not built to handle a world…

Return to navigation

Product Details

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with device intelligence, in order to allow organizations across every industry to classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets.

Forescout Platform Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(28)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found that Forescout Continuum, specifically CounterAct, effectively safeguards their networks from unauthorized devices. By ensuring that only authorized and company-owned assets can connect, CounterAct provides a strong defense against potential security breaches. The software's visibility capabilities enable users to monitor and protect their networks by segregating rogue devices and allowing only company-owned assets to be connected.

CounterAct also offers valuable features for compliance and risk management. It recognizes the versions of applications running on devices, allowing for constant monitoring and mitigation of associated risks. This ensures that organizations meet the mandatory requirements from regulatory bodies and stay in line with IT security and administrative mandates.

Moreover, CounterAct's ability to create guest networks and enforce guest registration has been highly beneficial for companies. It requires approval from the employee being visited, further enhancing network security. The software's extensive use cases range from automating security for in-house IoT systems in healthcare-based clients to providing comprehensive visibility and automated control for all devices connected to the network.

Overall, users appreciate how Forescout Continuum improves network protection, simplifies administration tasks, and reduces operational and business risks through its advanced automation feature. It allows them to view connected assets, assess their statuses periodically, and ensure data and systems are safeguarded from malicious activities.

Effective Network Visibility and Control: Reviewers have consistently praised Forescout Continuum for its ability to provide visibility and control over authorized devices connecting to their network. Multiple users have mentioned that this feature has enhanced network security by ensuring that only authorized devices are able to connect, ultimately helping to protect against potential threats.

Guest Registration Management: Many reviewers have found Forescout Continuum's guest registration feature to be easy to manage and monitor. This feature is highly effective in allowing for secure and controlled access for guests connecting to the network, providing an additional layer of security while maintaining network integrity.

Endpoint Visibility and Threat Detection: Several users have highlighted the benefits of Forescout Continuum's endpoint visibility capabilities. They appreciate being able to see which devices are connected to their system and having early detection for potential threats. This proactive approach allows them to take necessary measures in mitigating risks across all their Layer 2 networks.

Outdated User Interface: Some users have expressed that the user interface of Forescout Continuum's thick client is in need of updates. They feel that transitioning to a web-based interface would greatly improve its aesthetics and overall appearance.

Complex Initial Configuration: According to reviewers, the initial configuration process of Forescout Continuum can be quite complex. Some users have mentioned that additional training and demos may be required, especially for the latest versions released, in order to effectively navigate and set up the software.

Inflexible Policy-Based Controls: The policy-based controls of Forescout Continuum have been criticized by some users for their inflexibility and complexity. Building policies within the software can be intricate, leading to potential isolation of assets or inconvenient mediation of threats at certain moments.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are giving greater triple layer security to our networks within the company, Forescout Continuum generates recent support for what we do at a programmatic level, the biggest challenge we had with the company was to be able to stabilize the knowledge of dangerous points that had to be vilndar to avoid intrusions from other networks, separate sectors so that departments of a site cannot enter files of others without authorization, Forescout Continuum has allowed us to learn more and solve more than enough.
  • Particularly, it helps us to examine vulnerable network points with an exhaustive audit, and with that audit we can generate strategic plans to improve failures, start screening with new programs according to departmental sectors or at the company level.
  • It generates continuous developments in the field of networks, we can control in this sense the income and expenses, blockades and also notifies us of dangerous situations within the company, generates reports and alerts an email in charge of the appropriate personnel through alarms.
  • What I liked the most is that it can generate separation of devices on PCs, mobiles, android and linux operating systems, it can generate separation in that sense and generate a very good order.
  • It gives us a holistic look at what has problems and what doesn't.
  • I refuse to speak badly about the software, it is a software in continuous development, I think it is one of the best we have had, in this sense, according to the needs for extra security in networks, the program is capable of leading several areas within the company and generates a good administration in network security.
I strongly recommend using it in networks where many machines enter, it is essential to have a capture of all ids, mac etc to prevent and detect unauthorized machines.We are in the technological era and there is a lot of technological robotization looking for weak systems to enter.Invest in greater security and that does not happen to you.
  • The order is crucuail, it simply gives us the best order and management for our company.
  • In the sense of security and alerts by notification, it creates a quite friendly environment that allows us to always be relaxed.
  • Secret keys, and permissions to authorized managers, we can program this situation very well by department.
  • Me still haven't fully paid for the software, but there are a few months left, in that sense I think we have saved costs by 20% avoiding repairing computers and losing information due to viruses or misconfigurations.
  • Much more time to devote to other tasks.
  • High notification plateaus to be able to repair.
Pauline Harris | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We utilize its visibility capabilities to monitor and protect our network from unauthorized devices as it segregates rogue devices and ensures only company-owned assets are connected. Also it makes sure it can recognize what versions of applications are running on what devices at all times and mitigate risks that may come by.
  • Rogue devices detection and segregation.
  • Guests registrations.
  • Visibility of devices that are connected to our system.
  • They should have more training for the versions of applications they update.
  • It would be great if the GUI would be more aesthetic in appearance.
  • Nothing else as the application is amazing.
It's quite a resourceful product especially when it comes to managing your compliance and visibility in the organization. Detection of threats and mitigating risks that may be involved with rogue devices accessing the company network. Your organization is able to tell what versions of applications are running on what devices and thus if updates or switching applications are needed they are up to the task.
  • Guests registrations.
  • Visibility capabilities
  • Compliance management.
  • We have been able to achieve deeper levels of security.
  • It has been able to counter most threats through the detection of rogue devices and segregating them.
  • Fostered accountability as guests' devices is signed in by employees so as to track activities they may be undertaking.
It was able to relieve us of some of the duties performed by the operations team as it made it easy to do those tasks. It allows us to view devices that are connected to our network and segregate those that are not company owned and also account for guests' logins as are signed by the employees they are visiting.
Shirleen Muraya | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It has helped with protecting our organizations data from unauthorized devices that may try to connect to our network.
It has also enabled us in keeping separate devices not owned by the organization that connect to our network by putting them in a guest network where the guests registrations are signed by the employee they are visiting.
  • Great in monitoring what applications versions are running and on what devices.
  • Good identification of unmanaged devices and segregating them.
  • Endpoint visibility.
  • It can be quite complex in initial configurations.
  • Would be great if the GUI were more interactive.
  • Everything else works great.
Works great in ensuring that only company owned assets are connected to the network and segregating those unauthorized devices by ensuring they connect to a separate guest network where the guests registrations are signed in by the employee they are visiting thus ensuring there are proper trails that can be followed incase of threats or anything else.
  • Threat detection
  • Intergrated appliance
  • Guests registrations
  • Security of our data by blocking out unauthorized access to our network
  • Deeper understanding of endpoint compliance
  • Efficiency in action due to faster detection of threats from rogue devices.
Better intergration with patch management tools. Forescount Platfform (CounterAct) is easily compatible with diverse network infrastructure to offer better service and efficiently ensure seamless operations. Its automation capabilities have also enabled us to depend less on the operations teams hence saving time as it's faster and also saving the operational cost of having people around in case of threats.
OpenText Alloy (formerly Liaison), Webex Meetings, QuoteWerks
Score 9 out of 10
Vetted Review
Verified User
Forescout Platform (CounterACT) is able to discover and monitor wide range of asset inventory in the organization. Besides, it is also able to improve the workforce productivity and simplify the administration tasks. With the advanced automation feature, it also helps to reduce the operational and business risk significantly as it has eliminated any potential human errors.
  • Agentless deployment
  • Auto classification
  • Real time monitoring
  • Auto classification may not be accurate
  • Integration with other product can be complex
  • Required expertise for troubleshooting
Forescount Platform (CounterACT) provides multiple active and passive monitoring techniques which can be very flexible. Integration with other third-party products such as Cisco ACI, AWS and others can be complex and may required expertise to facilitate. Besides, it is also capable to perform asset discovery for OT and IoT environments.
  • Real-time deep discovery
  • Automated classification
  • Integration with other products
  • Reduced operational cost
  • Improved productivity
  • Better reporting for risk assessment
Forescout Platform (CounterACT) is capable to perform intelligent device classifications which able to group and segmentize the assets effectively. Besides, the classification techniques can be customized according to the organization requirements. With agentless deployment, any new or unused inventory can be managed easily. Overall interface is quite user-friendly and able to simplify the administration tasks.
Cisco Identity Services Engine (ISE), Aruba ClearPass, FortiNAC
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Forescout CounterAct is being used by the IT department. The main reason behind the purchase of Forescout was for Network Access Control. We wanted to make sure any device connected to our network that was not property of our company to be segregated off our company network and pushed directly to a separate network with only internet access.
  • Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them.
  • The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network.
  • Policies can be very intricate.
  • Policies ability to be very intricate also adds complexity to the building of the policy.
  • Initial configuration is complex
  • Uses SMB1 which is a vulnerable version - needs to be updated asap.
ForeScout CounterACT is well suited for a company looking to strengthen their network security. It has allowed us to be confident that there is not a rogue device connecting directly into our network to gain access to company information. It may not be suitable to a company with a small IT department as it does require time up front to initially configure and on an on-going basis to manage.
  • It has proven very effective at blocking rogue, non-company owned devices from gaining access to our network.
  • It has provided security to a deeper level.
  • Auditors have acknowledged very tight security with the addition of CounterACT.
  • Aruba Clearpass
CounterACT was the product that was able to do exactly what we were looking to accomplish and that was to block non-company owned devices from connecting to our network based on our criteria. It will allow us to decide if a blocked device should be allowed on our network temporarily.
CommVault, Proofpoint Enterprise Privacy
Return to navigation