CounterAct is the Swiss army knife of network security
January 16, 2018

CounterAct is the Swiss army knife of network security

Mitchell Greenfield | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with ForeScout CounterACT

CounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.
  • Ensure authorized devices only connect to our network
  • Guest registration
  • Endpoint visibility
  • Thick client UI could use some updates to be web based
  • ForeScout has automated the detection of rogue devices
  • ForeScout has enabled us to get a get a better understanding of endpoint compliance
  • Cisco ISE
We selected CounterACT because it didn't require 802.1x and it didn't require any switch upgrades. To use 802.1x we would have to assume all endpoints are guilty until proven innocent. With CounterACT we can detect quickly if endpoints are not compliant and remediate without the user knowing.
ForeScout is great on a network where you have authorized assets are able to authenticate to them. If you have a mixed environment where you can't authenticate to devices it is probably less appropriate.