See your network—devices, operating systems, users, applications
IDC Connect: 2014 Cyber Defense Maturity Report for U.S., U.K. & DACH. Download »
Frost & Sullivan Report: "Continuous Compliance and Next Generation NAC"
ESG Report: Optimizing
ForeScout CounterACT Platform Brochure.
ForeScout White Paper: Blueprint for Continuous Monitoring & Mitigation Download »
ControlFabric Technologies Brochure.
ForeScout Company Overview
Gartner Report: "Magic Quadrant for Network Access Control"
CSO Mag Continuous Monitoring Video
Watch Now »
ForeScout CounterACT gives you real-time visibility of your network — devices, operating systems, users, applications.
Before you can manage your network’s security, you have to have visibility of your network. This includes:
Many IT managers think they know what is on their network, but in reality this is quite difficult. The information provided by agent-based security systems (Symantec, McAfee, Trend, Sophos, etc.) or patch management systems (BigFix, Lumension, Microsoft, etc.) is often incorrect.
Agent-based security systems are typically limited to corporate-owned devices. As a result, security teams typically have no visibility into the security of employee-owned devices and devices that are not computers. The list includes:
ForeScout CounterACT is a network appliance that reveals devices on your network: computers, switches, VoIP phones, printers, personal cell phones, rogue wireless access points, USB drives, and more. CounterACT incorporates the most granular host interrogation engine in the industry and can determine most configuration detail of endpoints. CounterACT automatically builds a profile of each endpoint, including:
Administrators can access this information using a simple Google-like search interface that displays a detailed catalog of connected users and devices. From there, they can easily locate problematic or nonconforming users, endpoints, and devices – right down to physical switches and switch-ports.
ForeScout CounterACT is easy to deploy. It is a simple appliance that installs out-of-band on the network. It requires no software installation on host computers.
ForeScout CounterACT uses multiple technologies to learn about your network. The following is the information that CounterACT will show you:
ForeScout CounterACT is a simple appliance that installs out-of-band on your network. It requires no software installation.
By knowing about devices on your network, you will be in a better position to assess risks and take action to remediate vulnerabilities.
ForeScout CounterACT lets you identify network infrastructure not provisioned by IT such as wiring hubs, wireless access points, and DHCP servers. Often these unauthorized devices are the source of network instability and outages.
Don’t risk network protection with a false sense of security. ForeScout CounterACT shows you which endpoints have broken, out-of-date, or missing anti-virus, patch management, encryption, or DLP tools.
By revealing the unmanaged systems and /or insecure endpoints connecting to your network, you can proactively target remediation activities such as updating/activating anti-malware and applying patches. Also, help desk personnel find the information provided by CounterACT to be very valuable for troubleshooting problems with endpoint systems.
The information generated by ForeScout CounterACT can be exported to your existing IT management systems. Integrations are available for a wide variety of third party systems, and customers can build custom integrations with the Open Integration Module.
Click image to enlarge.
Best Practices Guide
Webinars and Webcasts