Skip to main content
TrustRadius
Forescout Platform

Forescout Platform
Formerly CounterACT

Overview

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.…

Read more
Recent Reviews

TrustRadius Insights

Users have found that Forescout Continuum, specifically CounterAct, effectively safeguards their networks from unauthorized devices. By …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices.…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

8 people also want pricing

Alternatives Pricing

What is NordLayer?

NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best regulatory…

What is Twingate?

Twingate allows businesses to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT teams, and end users easier, it replaces outdated corporate VPNs which were not built to handle a world…

Return to navigation

Product Details

What is Forescout Platform?

Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with device intelligence, in order to allow organizations across every industry to classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical business assets.

Forescout Platform Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(28)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found that Forescout Continuum, specifically CounterAct, effectively safeguards their networks from unauthorized devices. By ensuring that only authorized and company-owned assets can connect, CounterAct provides a strong defense against potential security breaches. The software's visibility capabilities enable users to monitor and protect their networks by segregating rogue devices and allowing only company-owned assets to be connected.

CounterAct also offers valuable features for compliance and risk management. It recognizes the versions of applications running on devices, allowing for constant monitoring and mitigation of associated risks. This ensures that organizations meet the mandatory requirements from regulatory bodies and stay in line with IT security and administrative mandates.

Moreover, CounterAct's ability to create guest networks and enforce guest registration has been highly beneficial for companies. It requires approval from the employee being visited, further enhancing network security. The software's extensive use cases range from automating security for in-house IoT systems in healthcare-based clients to providing comprehensive visibility and automated control for all devices connected to the network.

Overall, users appreciate how Forescout Continuum improves network protection, simplifies administration tasks, and reduces operational and business risks through its advanced automation feature. It allows them to view connected assets, assess their statuses periodically, and ensure data and systems are safeguarded from malicious activities.

Effective Network Visibility and Control: Reviewers have consistently praised Forescout Continuum for its ability to provide visibility and control over authorized devices connecting to their network. Multiple users have mentioned that this feature has enhanced network security by ensuring that only authorized devices are able to connect, ultimately helping to protect against potential threats.

Guest Registration Management: Many reviewers have found Forescout Continuum's guest registration feature to be easy to manage and monitor. This feature is highly effective in allowing for secure and controlled access for guests connecting to the network, providing an additional layer of security while maintaining network integrity.

Endpoint Visibility and Threat Detection: Several users have highlighted the benefits of Forescout Continuum's endpoint visibility capabilities. They appreciate being able to see which devices are connected to their system and having early detection for potential threats. This proactive approach allows them to take necessary measures in mitigating risks across all their Layer 2 networks.

Outdated User Interface: Some users have expressed that the user interface of Forescout Continuum's thick client is in need of updates. They feel that transitioning to a web-based interface would greatly improve its aesthetics and overall appearance.

Complex Initial Configuration: According to reviewers, the initial configuration process of Forescout Continuum can be quite complex. Some users have mentioned that additional training and demos may be required, especially for the latest versions released, in order to effectively navigate and set up the software.

Inflexible Policy-Based Controls: The policy-based controls of Forescout Continuum have been criticized by some users for their inflexibility and complexity. Building policies within the software can be intricate, leading to potential isolation of assets or inconvenient mediation of threats at certain moments.

Attribute Ratings

Reviews

(1-7 of 7)
Companies can't remove reviews or game the system. Here's why
Pauline Harris | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It was able to relieve us of some of the duties performed by the operations team as it made it easy to do those tasks. It allows us to view devices that are connected to our network and segregate those that are not company owned and also account for guests' logins as are signed by the employees they are visiting.
Shirleen Muraya | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Better intergration with patch management tools. Forescount Platfform (CounterAct) is easily compatible with diverse network infrastructure to offer better service and efficiently ensure seamless operations. Its automation capabilities have also enabled us to depend less on the operations teams hence saving time as it's faster and also saving the operational cost of having people around in case of threats.
Score 9 out of 10
Vetted Review
Verified User
Forescout Platform (CounterACT) is capable to perform intelligent device classifications which able to group and segmentize the assets effectively. Besides, the classification techniques can be customized according to the organization requirements. With agentless deployment, any new or unused inventory can be managed easily. Overall interface is quite user-friendly and able to simplify the administration tasks.
Eduardo Ramirez | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Forescout Platform (CounterACT)
When I got here, they already had this product in place, so I was not part of the final decision, but after using this for a couple of years, I can say that it was an intelligent decision for the business!!
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Heterogeneous compatibility with switches and other network infrastructure setup is a major advantage. There are many companies where there is a legacy network combined with different OEM deployed. Integration of network devices like switches, FW, routers, AP's gives complete details of endpoints connected in which segment and on which switch and respective port numbers to. Control action to manageable systems reduces a lot of dependency on the operations team.
Mitchell Greenfield | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Cisco ISE
We selected CounterACT because it didn't require 802.1x and it didn't require any switch upgrades. To use 802.1x we would have to assume all endpoints are guilty until proven innocent. With CounterACT we can detect quickly if endpoints are not compliant and remediate without the user knowing.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Aruba Clearpass
CounterACT was the product that was able to do exactly what we were looking to accomplish and that was to block non-company owned devices from connecting to our network based on our criteria. It will allow us to decide if a blocked device should be allowed on our network temporarily.
Return to navigation