"ForeScout provides JPMorgan Chase with enhanced visibility and control across the hundreds of thousands of devices connected to our corporate network. We were able to rapidly deploy ForeScout’s technology globally, at scale, which highlights the product’s ease of implementation. ForeScout’s technology also helps us automate and dynamically enforce security policies across our environment."
"With ForeScout, we’re able to extend our network into an untrusted space and still get a trusted solution."
"With the help of Foursys, CounterACT was easy to deploy, didn’t need a lot of associated hardware to run — even for an organisation of our size — and ticked all the boxes with regards to assessment, policy enforcement and compliance."
"We have a geographically dispersed infrastructure and ForeScout delivered centralized, real-time visibility and control with regards to anything touching our network. ForeScout CounterACT enables us (Daktronics) to enforce an acceptable use policy including mobile devices, manage peer-to- peer (P2P) applications, and stop propagating worms and advanced persistent threats."
"We evaluated the five leading access and control solutions. ForeScout was the only one that supported agentless operation and provided the flexibility to integrate with other solutions.”
"By using CounterACT as extensively as possible, not only did we improve our overall network security and visibility, but also the effectiveness of our endpoint security investments."
"We needed a NAC solution that was fast to deploy, without any risk of business interruption. In addition, it needed to support our mixed Aruba and Cisco IT infrastructure. ForeScout CounterACT offered us all of this and much more including impressive integration capabilities with our existing FireEye and ArcSight security tools. This is why we call CounterACT the ‘Swiss Army knife’ of our information security department, as it facilitates multiple, automated security checks and compliance controls in the most efficient way."
"No other network access control product that we looked at combined the wealth of features that we saw in ForeScout CounterACT, and at the same time no other product was so simple to deploy. ForeScout CounterACT worked well with our existing network infrastructure, without changes."
"Before we were primarily focused on detecting rogue devices, isolating them off the network and sending us an alert. The addition of Forescout visibility and scripting has been awesome. It’s a huge tool in our arsenal that we didn’t have previously."
"With an educational establishment like ours, most of the threats are within as pupils try and bypass the security systems we have in place. In addition, many pupils have up to three devices each, be it a smartphone, tablet or laptop, so we really have to be ahead of the game to keep security threats at bay. Having deployed ForeScout CounterACT, I believe we have the best available NAC solution to protect our network, and the new virtual appliance allows us to scale up quickly for guest access, such as open days for prospective parents."
"We’re really pleased with how easily everything fell into place. We brought in expertise from system integrator Konsultek, and it made all the difference in the world. The training helped us get everything installed and set up advanced functions within a single week."
"ForeScout was simple one box, one day to install and agentless operation. It met all our needs, and we had to make no changes to our network. That’s why we chose ForeScout – simple, cost effective, easy to use."
"ForeScout CounterACT saves our IT team costs and increases efficiency and we save the time that would otherwise have been spent monitoring the network and more manually responding to securityissues with connected devices and that’s a real benefit."
"We chose CounterACT because it was the only solution that met all of our criteria, It is low impact for our end users and very simple to setup, and we started seeing results on the first day. Plus, the interface is easy to navigate, and the solution requires very little maintenance after initial deployment."
"We recently had a spear phishing attack. We used CounterACT to create a virtual firewall that allowed us to automatically notify users that their machine was compromised and to request they bring it to the helpdesk for remediation."