A great compliance solution with an edge.
July 18, 2022

A great compliance solution with an edge.

Pauline Harris | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Modules Used

  • eyeSight
  • eyeSegment
  • eyeControl
  • eyeExtend

Overall Satisfaction with Forescout Platform (CounterACT)

We utilize its visibility capabilities to monitor and protect our network from unauthorized devices as it segregates rogue devices and ensures only company-owned assets are connected. Also it makes sure it can recognize what versions of applications are running on what devices at all times and mitigate risks that may come by.
  • Rogue devices detection and segregation.
  • Guests registrations.
  • Visibility of devices that are connected to our system.
  • They should have more training for the versions of applications they update.
  • It would be great if the GUI would be more aesthetic in appearance.
  • Nothing else as the application is amazing.
  • Guests registrations.
  • Visibility capabilities
  • Compliance management.
  • We have been able to achieve deeper levels of security.
  • It has been able to counter most threats through the detection of rogue devices and segregating them.
  • Fostered accountability as guests' devices is signed in by employees so as to track activities they may be undertaking.
It was able to relieve us of some of the duties performed by the operations team as it made it easy to do those tasks. It allows us to view devices that are connected to our network and segregate those that are not company owned and also account for guests' logins as are signed by the employees they are visiting.

Do you think Forescout Platform delivers good value for the price?


Are you happy with Forescout Platform's feature set?


Did Forescout Platform live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Forescout Platform go as expected?


Would you buy Forescout Platform again?


It's quite a resourceful product especially when it comes to managing your compliance and visibility in the organization. Detection of threats and mitigating risks that may be involved with rogue devices accessing the company network. Your organization is able to tell what versions of applications are running on what devices and thus if updates or switching applications are needed they are up to the task.