Enforce and automate policy-based controls.
Take action to mitigate threats, incidents and compliance gaps. Download What’s New!
Enforce and automate policy-based controls.
Take action to mitigate threats, incidents and compliance gaps. Download What’s New!
eyeControl enforces and automates policy-based network and host controls through integrations with heterogeneous physical and virtual network infrastructure. Actions can be automated or administrator-initiated, and gradually increased to minimize disruption while reducing manual effort to enforce network access, improve device compliance, implement network segmentation, and accelerate incident response.
ENFORCE NETWORK ACCESS
Control access to enterprise resources based on user profile (guest, employee, contractor), device properties, classification and security posture.
IMPROVE DEVICE COMPLIANCE
Automate compliance assessment and enforce remediation controls for continuous compliance with internal security policies, external standards and industry regulations.
SEGMENT DYNAMICALLY
Apply dynamic network segmentation policies across disparate enforcement technologies in your extended enterprise through a common policy framework.
ACCELERATE INCIDENT RESPONSE
Quickly and effectively contain threats and respond to security incidents to minimize disruption to operations and damage to the business.
Lack of heterogeneous network infrastructure support | Interoperate with heterogeneous physical, software-defined and cloud networking infrastructure to avoid upgrades |
802.1X design complexity | Easy to deploy (802.1X is optional) |
Point-in-time device hygiene & compliance checks | Continuously assess devices, monitor them and enforce compliance policies |
Broken/missing agents = non compliance | Automatically detect, install/repair broken agents and inform agent-based platforms |
Segmentation policy sprawl | Unified segmentation planning and enforcement |
Lengthy mean-time-to-response | Quickly isolate and contain compromised or malicious devices to avoid lateral malware propagation |
Empowers security teams to prioritize, enforce and automate policy-based controls with confidence.
Automate basic, repetitive tasks and free up skilled IT resources to focus on higher-impact issues.
Improve network access, device compliance, network segmentation and incident response initiatives.
Agentless Visibility and Control White Paper Download
Internet of Things (IoT) Solution Brief Download
Forescout products can be deployed on virtual or physical appliances. For virtualized environments, VMware® ESXi, Microsoft® Hyper-V, and KVM hypervisors are supported. Large networks that require multiple physical or virtual appliances can be centrally managed by eyeManage.
For more information, download
the Licensing and Sizing Guide.
For customers using Forescout CT and CEM series appliances with CounterACT 7, specifications are available here:
Download Specifications for
CounterACT 7
Toll-Free (US): 1-866-377-8771
Tel (Intl): +1-408-213-3191
Support: +1-708-237-6591
Headquarters
190 W Tasman Dr.
San Jose, CA, USA 95134
We’re happy to provide additional information about our solutions. Please fill out this form and a Forescout Solution Expert will contact you as soon as possible.