"We were up and running with ForeScout CounterACT in just a few weeks, and received fantastic intelligence almost immediately. That alone was worth the cost of the solution, as our team was much better informed, and ultimately able to make more effective decisions."
"CounterACT delivered value from day one. As soon as it came online we saw our 2,000 endpoints light up on the screen. From there, it only got better as we automated the management of these endpoints and created reports and audit trails generated at the click of a button."
"I’ve been extremely impressed with Forescout people as well. It’s wonderful to have a vendor relationship like we have. The Forescout team goes above and beyond; they’re just great to work with."
"With an educational establishment like ours, most of the threats are within as pupils try and bypass the security systems we have in place. In addition, many pupils have up to three devices each, be it a smartphone, tablet or laptop, so we really have to be ahead of the game to keep security threats at bay. Having deployed ForeScout CounterACT, I believe we have the best available NAC solution to protect our network, and the new virtual appliance allows us to scale up quickly for guest access, such as open days for prospective parents."
"With ForeScout, we’re able to extend our network into an untrusted space and still get a trusted solution."
"One of the biggest challenges with the county is that we have different agencies with different IT initiatives and needs. Many times, they put their own devices on the network, and we might not be aware of it, so ForeScout has opened our eyes."
"ForeScout CounterACT’s agentless approach was key, as was its ability to give us full visibility into all devices, including medical devices connected to or attempting to connect to our network."
"We expect that eventually the Forescout platform will be used in some way by every IT team, including the service desk. It is much more than just a security product."
"ForeScout provides JPMorgan Chase with enhanced visibility and control across the hundreds of thousands of devices connected to our corporate network. We were able to rapidly deploy ForeScout’s technology globally, at scale, which highlights the product’s ease of implementation. ForeScout’s technology also helps us automate and dynamically enforce security policies across our environment."
"BYOD is not something that IT departments can ignore; it’s inevitable. CounterACT gives me peace of mind that my network is as secure as possible. It enables me to easily institute any BYOD policy, gives the flexibility needed to accommodate employees’ BYOD devices, on which we install agents and to monitor the public’s mobile devices with an agentless approach."
"We needed a NAC solution that was fast to deploy, without any risk of business interruption. In addition, it needed to support our mixed Aruba and Cisco IT infrastructure. ForeScout CounterACT offered us all of this and much more including impressive integration capabilities with our existing FireEye and ArcSight security tools. This is why we call CounterACT the ‘Swiss Army knife’ of our information security department, as it facilitates multiple, automated security checks and compliance controls in the most efficient way."
"Before we were primarily focused on detecting rogue devices, isolating them off the network and sending us an alert. The addition of Forescout visibility and scripting has been awesome. It’s a huge tool in our arsenal that we didn’t have previously."
"Our network was infiltrated by a worm a few years back, which caused major disruption and downtime, with the whole IT team working around the clock to fix the problem. Since installing ForeScout CounterACT, such threats have been easily contained without incurring any network downtime."
"Thanks to ForeScout CounterACT, we have been able to clean up our entire network and implement secure access for employee notebooks and guest devices. Everything has been very smooth right from day one."
"ForeScout CounterACT delivered value the minute we plugged it in. By giving us the ability to see and gain intelligence on more than 4,000 endpoints, we now have a better way to manage and control our network security. Since the initial deployment, the solution has grown with us, and we’ve realized added value as we incorporate more functions into our security policies. — I’m excited to see where we will go with it in the future."