You Can’t Secure What You Can’t See™
eyeSight uses over 20 passive and active monitoring techniques to discover managed and unmanaged devices connecting to your heterogeneous network infrastructure.
- User devices (e.g. laptops, tablets and phones)
- Virtual and physical computer, storage and network devices
- IoT, OT and IIoT devices
eyeSight auto-classifies traditional, IoT and OT devices using a multi-dimensional classification taxonomy to identify device function, type, operating system (including version), vendor and model.
- 500+ Operating Systems & Versions
- 5,000+ Vendors and Models
- 10,000+ Device Types
eyeSight continuously monitors the network and assesses the configuration, state and security of connected devices to determine their compliance posture and risk profile.
- 350+ Healthcare OT device vendors
- 100+ IT/Industrial OT protocols support
- 3,000+ Models of IIOT and OT Devices
- 350+ networking vendors and models across 350+ OS versions
Classify Your Devices
Operating Systems & Versions
Device Vendors & Models
Models of IIOT & OT Devices
Gain unparalleled visibility into all IP-connected devices across the extended enterprise the instant they connect to the network — without requiring agents.
Gain complete situational awareness of your device landscape and their risk profile by continuously monitoring the network to discover and auto-classify devices as well as assess their security posture.
Use passive-only profiling techniques to gain device visibility into sensitive IoT, OT and critical infrastructure systems without impacting system uptime, introducing operational risk or disrupting critical business processes.
COMPLETE ASSET INVENTORY
Get a real-time asset inventory of all physical and virtual devices – laptops, mobile, IoT, OT, network infrastructure, servers, virtual machines and cloud instances – connected across your campus, data center, cloud and OT networks.
|Incomplete/inaccurate device visibility||Discover and profile all IP-connected devices|
|Can't see or classify devices that don't have software agents||100% visibility and classification of devices agentlessly|
|Invasive, periodic scanning||Continuous monitoring using passive discovery and profiling|
|Disparate tools/knowledge||A single dashboard for entire device landscape|
|Missing data for unmanaged devices (IoT & OT)||Inventory all devices – IT, IoT & OT|
PUTTING HEALTHCARE SECURITY UNDER THE MICROSCOPE
Forescout Advanced Endpoint Visibility for ITAM and CMDB White Paper Download
Agentless Visibility and Control White Paper Download
Agentless Visibility Solution Brief Download
Internet of Things (IoT) Solution Brief Download
Forescout products can be deployed on virtual or physical appliances. For virtualized environments, VMware® ESXi, Microsoft® Hyper-V, and KVM hypervisors are supported. Large networks that require multiple physical or virtual appliances can be centrally managed by eyeManage.
For more information, download the Licensing and Sizing Guide.
For customers using Forescout CT and CEM series appliances with CounterACT 7, specifications are available here:
Download Specifications for CounterACT 7