A complete network access control solution
May 03, 2022

A complete network access control solution

Shirleen Muraya | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Modules Used

  • eyeSight

Overall Satisfaction with Forescout Platform (CounterACT)

It has helped with protecting our organizations data from unauthorized devices that may try to connect to our network.
It has also enabled us in keeping separate devices not owned by the organization that connect to our network by putting them in a guest network where the guests registrations are signed by the employee they are visiting.
  • Great in monitoring what applications versions are running and on what devices.
  • Good identification of unmanaged devices and segregating them.
  • Endpoint visibility.
  • It can be quite complex in initial configurations.
  • Would be great if the GUI were more interactive.
  • Everything else works great.
  • Threat detection
  • Intergrated appliance
  • Guests registrations
  • Security of our data by blocking out unauthorized access to our network
  • Deeper understanding of endpoint compliance
  • Efficiency in action due to faster detection of threats from rogue devices.
Better intergration with patch management tools. Forescount Platfform (CounterAct) is easily compatible with diverse network infrastructure to offer better service and efficiently ensure seamless operations. Its automation capabilities have also enabled us to depend less on the operations teams hence saving time as it's faster and also saving the operational cost of having people around in case of threats.

Do you think Forescout Platform delivers good value for the price?

Yes

Are you happy with Forescout Platform's feature set?

Yes

Did Forescout Platform live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Forescout Platform go as expected?

Yes

Would you buy Forescout Platform again?

Yes

Works great in ensuring that only company owned assets are connected to the network and segregating those unauthorized devices by ensuring they connect to a separate guest network where the guests registrations are signed in by the employee they are visiting thus ensuring there are proper trails that can be followed incase of threats or anything else.