Control
SEE
Agentless visibility
CONTROL
Policy-based segmentation and enforcement
ORCHESTRATE
Security automation
Basic access control is outdated. It’s too rigid and overbearing for users and IT. Want to use real-time device context to plan network segmentation, automatically segment devices and enforce the appropriate level of control?
Take Control
Once CounterACT discovers a security problem on a device, its sophisticated policy manager can automatically execute a range of responses depending on the severity of the problem. Minor violations might result in a warning message sent to the end user. Employees and contractors who bring their own devices can be redirected to an automated onboarding portal. Serious violations could result in actions such as blocking or quarantining the device, reinstallation of a security agent, re-starting of an agent (such as third-party antivirus or encryption software) or process, triggering the endpoint to retrieve an operating system patch, segmenting to a more secure VLAN, or performing other remediation actions.
Forescout can enforce the appropriate level of control—from modest to stringent—based on your security policies.
Remediate Malicious or High-risk Devices
Based on your security and compliance policies, CounterACT can directly remediate the problem, alert IT staff, or inform the non-compliant device user and/or redirect them to a secure self-help portal.
This real-time, agentless approach can help ensure that:
Authorized endpoints are properly configured.
Host-based security applications, such as antivirus, are installed, running and updated.
Vulnerabilities are patched and the latest versions of software are installed.
Encryption and data loss prevention agents are running properly.
Unauthorized software is disabled.
Suspicious endpoints are safely quarantined and remediated.
Learn more about Control from Real-time Use Cases
Device Compliance
Put a stop to stopgap compliance. Improve device hygiene and regulatory compliance across your extended enterprise.
“The Forescout platform detected industrial control systems with embedded OSs and devices that did not meet our compliance policies.”
Network Segmentation
Assess and segment devices on the fly using real-time device context and your existing infrastructure.
“Today we know what’s on our network—including IoT devices. The Forescout platform classifies the device and slips it onto the appropriate VLAN segment.”
Network Access Control
Gain real-time device visibility and control across your heterogeneous network—without requiring agents or costly upgrades.
“Forescout provides JPMorgan Chase with enhanced visibility and control across the hundreds of thousands of devices connected to our corporate network.”
Incident Response
Accelerate. Orchestrate. Remediate. Automate threat mitigation to avoid data breaches with accelerated incident response.
“Forescout is like having an automatic threat hunter that hunts for threats around the clock across our global network. Tasks that took hours now take just minutes.”
READY TO KICK THE TIRES?
Here’s your chance to put Forescout through its paces and experience the difference of agentless visibility and control.