Latest Headlines | Latest Press Releases | Latest Webcasts | Latest Case Studies| Latest Videos/Podcasts | Latest Research | Latest Recognition | Latest Reviews | Upcoming Events

Latest Headlines

infoRisk Today | Information Security Media Group | April 2015
What’s on Your Network?
Interview with Sandeep Kumar From ForeScout on Knowing Your Endpoints


CBS News | Michael DeCesare | February 2015
In cybersecurity, sharp eyes and speed are the new padlocks
“It’s time to acknowledge the futility of setting out to defend pristine, impregnable data fortresses. Heresy? Only to those overinvested in past practice. It’s time for a new, practical security strategy emphasizing high environmental awareness, lightning response, and constant learning.”
CRN | Michael Novinson | February 2015
13 Things To Know About ForeScout’s New CEO
“DeCesare said he was impressed by the maturity of ForeScout’s CounterACT product, which is already on its seventh iteration, as well as the vendor’s inroads with tier-one government and financial services clients…ForeScout is well-positioned to take its portfolio downstream to other Global 2000 companies, he said.”
Reuters | Jim Finkle | February 2015
Former McAfee president leaves Intel to run ForeScout
“Mike DeCesare, a senior executive with Intel Corp’s security group, has left the company and taken a job running privately held cybersecurity firm ForeScout.”
NetworkWorld | Tim Greene | February 2015
New Forescout CEO wants to make partners an offer they can’t refuse
“He calls this integration with other systems ForeScout’s untapped jewel to which he hopes to bring more visibility and recognition. The relationships with other vendors are at varying levels of maturity, but DeCesare, who has a sales background, says he hopes to deepen them, bundle CounterACT with the third-party platforms and be more aggressive with sales.”

Wall Street Journal | Theresia Gouw | January 2015
Theresia Gouw: Cybersecurity Goes from Geek to Chic
ForeScout is at the forefront of this change, enabling IT departments to
see in real time every single device connected to their networks and ensure
that each of those devices has the necessary security by utilizing all the
company’s existing network technologies. ForeScout provides
counter-warfare-like technology to IT, enabling them to close the loop
between intelligence and action.


SC Magazine | Peter Stephenson | December 2014
2015 SC Awards U.S. Finalists: Round Three
Finalist in 2015 SC Awards U.S

Latest Press Releases

ForeScout Technologies, Inc. today announced that CounterACT™ was named as the top solution in the Reader Trust Award Best NAC Solution category at the 2015 SC Awards. CounterACT was judged and won against solutions from Cisco, Cryptzone, Hexis and Trustwave.


ForeScout Technologies, Inc., a leading provider of continuous monitoring and mitigation solutions for Global 2000 enterprises and government organizations, today announced new ControlFabric integrations with several industry-leading advanced threat detection (ATD) solutions.


ForeScout Technologies, Inc. today announced that it has received the award for Network Project of the Year (Public Sector) at the Network Computing Awards 2015, held in London, UK, on 19th March.


CounterACT helps school maintain high level of compliance and mitigate potential breaches


Annual guide recognizes the best channel partner programs in the market

Latest Webcasts


Defending Against the Rogue:
Technology Solutions to Address unwanted Users, Devices and Applications

Description: This webinar features new research in a Bloor Research report by Fran Howarth, which looks at how next-generation NAC technologies have become essential tools in the security arsenal for preempting rogue user, device and application riska and ensuring that sensitive data is kept safe.



The In’s and Out’s of Next-Generation NAC
Enabling pervasive network security

Description: An interactive webinar that examines recent cyber defense research and explores the real-world application of next-gen NAC to enable pervasive network security.




Take Back Network Control: Taming the Rogue Device Threat
With workforce mobility, bring your own device (BYOD) into the workplace, and guest access into your network, enterprises are realizing how important it is to track and monitor who and what is accessing the network. We’ve recently seen examples of how rogue devices have caused significant damage through gaining access to corporate infrastructure through network vulnerabilities. And, it’s alarming how easy it is for this to happen. A rogue or unknown device connects onto what you thought was a protected network, gains access and proceeds to cause often irrevocable damage which can result in millions of dollars to your business. Can you afford for this to happen?

  • How do you know what devices are accessing your network?
  • How do you detect a rogue device?
  • What can you do to prevent a threat in your network and minimize the risk?


Architecting a Flexible Strategy for Securing Enterprise and Personal Mobile Devices
Phil Hochmuth, security program analyst at IDC
Scott Gordon, chief marketing officer at ForeScout
This webinar examines BYOD trends and risks, the mobile security landscape, policy development and control options. The session will also present a tiered service approach to enterprise mobile security where complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures.
Topics Include:

  • Real-world issues, considerations and operational impact
  • Policy development processes to tolerate, support or embrace BYOD
  • Why combine NAC, MDM and other technical controls
  • How to devise tiered security service strategy


See More Webcasts »

Latest Case Studies

University of Rochester Medical Center
URMC implemented ForeScout CounterACT™ to increase network visibility and security. The Center’s IT team used the solution’s agentless approach to gain visibility into all devices, including personal and medical equipment, connecting to the network, identify and triage malfunctioning devices and detect anomalous behavior. Read the full story »


Pioneer Investments Reaps Benefits of Continuous Monitoring and Mitigation by Deploying ForeScout CounterACT
Pioneer deployed CounterACT to more effectively monitor its host-based security systems, and ultimately provide visibility into its network resources, as well as endpoints accessing those resources. Read the full story »


Bremer Bank-logo
Bremer Bank Selects ForeScout CounterACT for Real-time Visibility, Guest Access and Automated Controls
After an exhaustive evaluation process, Bremer Bank ultimately chose ForeScout CounterACT™ for its ease of installation, management capabilities and robust feature set. Read the full story »


Stone Forest-logo
ForeScout CounterACT Improves Policy Enforcement for the Chio Lim Stone Forest group
After looking at several solutions, the CLSF group chose ForeScout CounterACT to improve network security and protect against the risks created by non-compliant endpoints.Read the full story »


See More Case Studies»

Latest Videos/Podcasts

Cyber Defense Matures in Las Vegas
Scott Gordon, CMO, FOreScout discussions value of ForeScout ControlFabric at the Blackhat Conference in Las Vegas.


Jon Oltsik: Next-Gen NAC evolves to Endpoint Visibility, Access and Security (EVAS)
Jon Oltsik, Sr. principal analyst for Enterprise Strategy Group, discusses endpoint visibility, access and security (EVAS) and ForeScout’s position.


Solving the Complexities with CounterACT – Frank Dickson
Frank Dixon, Industry Principal at Frost & Sullivan discusses how network and endpoint security is evolving towards continuous monitoring and response (two part video)


InfoSecurity Magazine Interview with Scott Gordon, CMO, ForeScout
Drew Amorosi, deputy editor of InfoSecurity, interviews Scott Gordon, Chief Marketing Officer at ForeScout, at InfoSecurity Europe 2013 about BYOD and NAC. (7 min.).


See More Videos/Podcasts »

Latest Research

Bloor Research: Defending Against the Rogue
This White Paper explains Next-generation NAC technologies which are essential tools in the security arsenal of any organization for pre-empting rogue user, device and application risks and ensuring that sensitive data is kept safe. Click here for full report


SANS: Continuous Diagnostics and Mitigation: Making It Work
Government agencies are very early in the process of adopting the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) program. The good news is: Those that are actually implementing CDM capabilities are experiencing better security as a result. To find out how well this program is being accepted by government agencies, SANS conducted a survey of government-focused IT professionals during the months of April and May to determine their awareness of the CDM guidance and their levels of implementation. Click here for full report


IDG Connect: State of Cyber Defense Maturity Report
Download this IDG global survey report based on responses from over 1500 IT security professionals that sheds light on the state of cyber defense maturity. Click here for the full report


Latest Recognitions

ForeScout CounterACT
“We were pleasantly surprised at how easy the ForeScout appliance was to set up. Because of its rich feature set, we find this product to offer great value. The capability of this device to interface with nearly any network device and endpoint application adds to its value greatly. We select this as our Best Buy.” Click here for full report


ForeScout Recognized as a Leader in the 2013 Magic Quadrant for Network Access Control
“For the third consecutive year ForeScout CounterACT was named by Gartner Inc. as a leader in its 2013 Magic Quadrant report for Network Access Control (NAC). ForeScout NAC innovations which includes its CounterACT platform and ControlFabric architecture also serve as the cornerstone technology addressing visibility, BYOD and continuous compliance trends.”Click here for the full report


Frost & Sullivan 2014 Global Technology Leadership Innovation Award in Network Security
ForeScout demonstrated visionary leadership to enhance network security manageability with the introduction of ControlFabric architecture, demonstrating that the company ‘gets it.’ ControlFabric technology provides essential bi-directional interfaces and protocols for ‘visibility, intelligence, and remediation’ across multiple network, security, and management tool sets. Extending the CounterACT platform with ControlFabric enables network security vendors to work together and cooperate to make network security easier for security professionals to achieve continuous monitoring and mitigation capabilities.Click here for full report


Latest Reviews

IAIT | April 2014
2014 IAIT Product Review
“IAIT, an independent testing laboratory based in Germany, examined CounterACT under great scrutiny with a practical test that integrated the appliance into a corporate network; engaged discovery and monitoring services; designed policies for classification, rogue detection and blocking, guest and mobile device management, and endpoint compliance and remediation; and conducted third-party system integration.”


SC Magazine | October 2013
CounterACT v7.1 Review: 5-Star “Best Buy” Rating
“In preparation for our installation, ForeScout provided a hardware appliance (the CT 100 model) and a large amount of easy-to-read documentation. From unpacking the appliance to getting the system up and operational, it took under 30 minutes to start tracking data… This was a pleasing experience from beginning to end. Best Buy.”


ForeScout Technologies CounterACT 7.0
Network Computing | June 2013
“The phenomenal growth of BYOD (bring your own device) is fuelling increased interest in Network Access Control (NAC) as businesses expand their mobile workforce. ForeScout is a leader in this market for good reason because its CounterACT solution has benefited from continuous development, allowing it to stay ahead of the latest threats… ForeScout has innovatively moved NAC beyond traditional access control, offering businesses complete flexibility concerning the use of a wide range of computing devices and what they can do. Along with simplified deployment this latest version delivers a wealth of new features that will enhance flexibility for users and increase control for businesses in equal measure.”


ForeScout Proves NAC Superiority Over Other Leading Vendors in Independent Test
Tolly Group
“Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. The complete 24-page report can be downloaded at”