New devices join your network every hour. Unmanaged notebooks, smartphones and tablets. Internet of Things (IoT) devices of all shapes and sizes. Rogue endpoints. Servers. These devices significantly expand your attack surface yet are invisible to many security products. ForeScout can see them, control them and orchestrate system-wide response. What would you do with network visibility?
See devices and details other systems can’t
ForeScout CounterACT® sees desktops, laptops, tablets, smartphones, IoT endpoints, peripherals and rogue devices the instant they connect to your network—even if they don’t have security agents installed. It discovers servers, routers and access points, too. CounterACT gathers in-depth insights about device types, users, applications, operating systems and more. Then it continuously monitors the devices, providing network visibility. No agents. No excuses. No kidding.
Control enforcement, not chaos
Unlike solutions that simply provide alerts and send IT scrambling, CounterACT allows, denies or limits network access based on device posture and your security policies. It can also automatically assess and remediate malicious or high-risk endpoints to help you comply with industry mandates and regulations.
Orchestrate system-wide security
Don’t change your network on our behalf. We work with wired and wireless network infrastructure, as well as Windows®, Linux, iOS®, OS X and Android. Chances are, if you have it, we work with it—including your existing security management tools. Our ControlFabric Architecture shares information and automates workflows to help more than 70 third-party tools* improve and unify system-wide security.
Several Features Set CounterACT Apart:
- Agentless: No endpoint agents are required for authentication and network access control, allowing CounterACT to see and control managed, unmanaged and IoT devices.
- Open Interoperability: CounterACT works with popular switches, routers, VPNs, firewalls, endpoint operating systems (Windows®, Linux, iOS®, OS X and Android), patch management systems, antivirus systems, directories and ticketing systems—without infrastructure changes or upgrades.
- Security Orchestration: Optional modules orchestrate information sharing and policy-based security enforcement between CounterACT and leading IT and security management products.
- 802.1X Authentication, or not: Choose 802.1X or other authentication technologies such as LDAP, Active Directory®, RADIUS®, Oracle® and Sun. Hybrid mode lets you use multiple technologies concurrently.