ForeScout enables organizations to continuously monitor and mitigate
security exposures and cyber attacks.
IDC Connect: 2014 Cyber Defense Maturity Report for U.S., U.K. & DACH. Download »
Frost & Sullivan Report: "Continuous Compliance and Next Generation NAC"
ESG Report: Optimizing
ForeScout CounterACT Platform Brochure.
ForeScout White Paper: Blueprint for Continuous Monitoring & Mitigation Download »
ControlFabric Technologies Brochure.
ForeScout Company Overview
Gartner Report: "Magic Quadrant for Network Access Control"
CSO Mag Continuous Monitoring Video
Watch Now »
ForeScout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s flagship CounterACT™ appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security products and management systems to share information and automate remediation actions.
One challenge for today’s enterprise is how to provide greater network accessibility while enforcing security standards. Attempting to maintain security policies for various types of devices and users connecting through numerous access mechanisms can be very difficult without more automated intelligence and management.
Another challenge is how to make better use of traditional IT security systems given today’s dynamic and complex network and an evolving threat landscape. Traditional IT controls are based on the reliance on endpoint security software, periodic vulnerability scans, and multitude of security products. This defense-in-depth model is a best practice, but results in a huge amount of data and often-isolated controls. When viewed as a whole, this conventional approach exhibits a number of problems such as:
ForeScout CounterACT is a proven, enterprise-scale network security solution that has been adopted by over 1500 enterprises and government organizations. CounterACT natively addresses the first two problems (real-time visibility and continuous monitoring) by identifying and assessing network users, endpoints and applications in real-time. Armed with this intelligence, CounterACT lets the organization easily phase-in powerful network and endpoint security policies.
Out-of-the-box, ForeScout CounterACT allows IT organizations to readily understand and control how users, systems and devices, including mobile devices and VMs, access network resources and applications. Once you configure pre-defined and custom security policies within CounterACT, the system automatically:
Our ForeScout ControlFabric architecture helps solve the second set of problems listed above. ControlFabric is an open technology that enables CounterACT and other IT solutions to exchange information, gain greater operational context and automate actions. This reduces the problem of information silos. Finally, CounterACT brings real-time control and automated remediation to IT security systems that heretofore have been limited to collecting, generating, analyzing or storing information (e.g. SIEM, ADT, VA, CMDB).
ForeScout’s ControlFabric partner ecosystem supports an array of popular network and security products. CounterACT includes a range of ControlFabric integrations at no extra charge. These base integrations link CounterACT to specific network infrastructure, system management and endpoint software. ForeScout also sells and supports CounterACT integration modules that offer more advanced interoperability with leading network and security systems.
As a result, IT security managers can achieve continuous monitoring and mitigation capabilities that better leverage their existing investments, optimize their IT resources, and enhance their overall security posture.