Effective mediation of Security threats.
April 21, 2022

Effective mediation of Security threats.

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Modules Used

  • eyeSight
  • eyeInspect
  • eyeSegment
  • eyeControl
  • eyeExtend

Overall Satisfaction with Forescout Platform (CounterACT)

We procured Forescout Counteract to gain comprehensive 360-degree visibility of the assets that make up our digital architecture. We use it to view the connected assets' statuses and run assessments on them from time to time. We also utilize it extensively to automate security across both in-house IoT and IoMT for our healthcare-based clients. By gaining sufficient context of our digital assets ecosystem from the single Counteract UI, we can respond to security risks more effectively as opposed to independent monitoring.
  • Enables sharing of real-time device identity configuration and security details.
  • It triggers automated security responses if security issues arise.
  • The Forescout Policy Based Controls are inflexible, they may isolate assets while mediating threats at inconvenient moments.
  • Automated Response actions
  • Workflow automation
  • Real-time insights display.
  • We've managed to automate our cybersecurity to impressive extents, now the IT security team puts focus on more important things.
  • We've attained successful assets risk mitigation for our clients.

Do you think Forescout Platform delivers good value for the price?

Yes

Are you happy with Forescout Platform's feature set?

Yes

Did Forescout Platform live up to sales and marketing promises?

Yes

Did implementation of Forescout Platform go as expected?

Yes

Would you buy Forescout Platform again?

Yes

Splunk SOAR (Security Orchestration, Automation and Response) (formerly Phantom)
Forescout has been robust enough to mediate security threats on our IT ecosystem (servers for the most part) with impressive automation capabilities. It has resourceful risk scoring algorithms that prioritize critical assets for security protocols, unlike its competitors. It's suitable for the protection of your digital terrain despite the size by continuously running assessments that will go a long way in neutralizing the impact of security breaches. Forescout has however frustrated our teams with the policy-based controls- it isolates devices unnecessarily while eliminating threats.