CounterACT is the best at prohibiting rogue access to networks.
April 22, 2022

CounterACT is the best at prohibiting rogue access to networks.

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Modules Used

  • eyeSight
  • eyeExtend
  • base modules

Overall Satisfaction with Forescout Platform (CounterACT)

We have employed Forescout Platform counterACT to mainly provide visibility and automated control across all devices connected to our network. It verifies the compliance of the devices with our IT security and administrative mandate. Forescout Platform CounterACT prevents unauthorized devices from connecting into our network safeguarding our data and systems from any malicious activities from the outside.
  • Has a powerful network access control.
  • It automatically detects IOCs in network and segregates infected device.
  • It prohibits unauthorized device from connecting with our network and directs them to sign in us guests.
  • I would appreciate a more vibrant looking GUI.
  • rigid controls.
  • Visual access to all devices in our network.
  • signing in of guests.
  • automated control over devices in our network.
  • secluding of assets to mediate threats.
  • Improved mitigation of risks.
  • It has been excellent at restricting unsanctioned access to our networks.
  • sustained workflows.

Do you think Forescout Platform delivers good value for the price?

Yes

Are you happy with Forescout Platform's feature set?

Yes

Did Forescout Platform live up to sales and marketing promises?

Yes

Did implementation of Forescout Platform go as expected?

Yes

Would you buy Forescout Platform again?

Yes

IBM Resilient Security Orchestration, Automation and Response (SOAR), Splunk Application Performance Monitoring (APM)
It has straightforward integration with end point security platforms; for verifying devices compliance for endpoint guidelines. Its network access control allows us privileged visibility to devices on our network and only authorized devices can connect to our network. It is ideal for large scale IT companies that need to protect their networks from external attacks.