Overall Satisfaction with ForeScout CounterACT
CounterAct is used to protect our network from unauthorized devices connecting to our network. We use it to ensure that only authorized and company owned assets are able to connect. We also use it to enable a guest network and move unauthorized machines to our guest network where we use the CounterACT guest registration system to enforce guest registration. Guest registration requires that a guest is approved by the employee they are visiting.
- Ensure authorized devices only connect to our network
- Guest registration
- Endpoint visibility
- Thick client UI could use some updates to be web based
- ForeScout has automated the detection of rogue devices
- ForeScout has enabled us to get a get a better understanding of endpoint compliance
- Cisco ISE
We selected CounterACT because it didn't require 802.1x and it didn't require any switch upgrades. To use 802.1x we would have to assume all endpoints are guilty until proven innocent. With CounterACT we can detect quickly if endpoints are not compliant and remediate without the user knowing.