Want to allow, deny or limit network access based on device posture and your security policies?
How about automatically quarantining, remediating or blocking non-compliant or compromised devices—without manual efforts—even while you’re asleep?
Once CounterACT® discovers a security problem on a device, its sophisticated policy manager can automatically execute a range of responses depending on the severity of the problem. Minor violations might result in a warning message sent to the end user. Employees and contractors who bring their own devices can be redirected to an automated onboarding portal. Serious violations could result in actions such as blocking or quarantining the device, reinstallation of a security agent, re-starting of an agent (such as third-party antivirus software) or process, triggering the endpoint to retrieve an operating system patch, segmenting to a more secure VLAN, or performing other remediation actions.
The following are examples of various control actions CounterACT can take:
ForeScout can enforce the appropriate level of control—from modest to stringent—based on your security policies.
Remediate Malicious or
CounterACT continuously monitors devices on your network. As soon as CounterACT sees issues, it takes immediate action. Based on your security and compliance policies, CounterACT can directly remediate the problem, alert IT staff, inform the non-compliant device user/redirect them to a secure self-help portal. This real-time, agentless approach can help ensure that:
Authorized endpoints are
Host-based security applications, such as antivirus, are installed, running and updated.
Vulnerabilities are patched and the
latest versions of software are installed.
Encryption and data loss prevention
agents are running properly.
Unauthorized software is disabled.
Suspicious endpoints are safely
quarantined and remediated.