Vendor information


Transforming Security Through Visibility

The unique capabilities of ForeScout can be summed up in three words:

See - The ForeScout CounterACT® platform provides real-time visibility into IP-connected devices—managed and unmanaged, corporate and personal, wired and wireless. Because CounterACT doesn’t require endpoint agents, it also discovers non-traditional Internet of Things (IoT) devices and personally owned Bring Your Own Device (BYOD) endpoints. CounterACT identifies and evaluates network endpoints and applications, determining the user, owner and operating system, as well as device configuration, software, services, patch state and the presence of security agents.

Control - CounterACT continuously scans the network and monitors the activity of every device. Unlike systems that simply flag violations and send alerts to IT and security staff, CounterACT lets you automate and enforce a comprehensive range of policy-based controls for network access, endpoint compliance and mobile device security.

Orchestrate - CounterACT integrates with more than 70 network, security, mobility and IT management products* via ForeScout ControlFabric® Architecture. This ability to orchestrate information sharing and operation among the security tools you already own and use lets you:

  • Share context and control intelligence across systems to enforce unified network security policy
  • Reduce vulnerability windows by automating system-wide threat response
  • Gain higher return on investment (ROI) from your existing security tools while saving time through workflow automation

* As of January 2016



Customer Service Team

1800 646 112