Forescout Platform Primary Use Case
We needed some protection in our environment. We use this product in some areas in our network to monitor the security of the endpoints of our users.View full review »
We are using this product as a NAC to secure our network and to meet IRS audit requirements. For example, we are using it to lock down our VPN solution.
Until now we had strict requirements for people logging in through VPN, including AD credentials and multifactor authentication, but no requirements for the actual hardware they were using. With Forescout, we can inspect every computer using VPN and block ones we don't permit, or remediate the ones we do permit.
Also, we will be able to quarantine and block computers that are not agency equipment on regular switch ports or wireless.View full review »
We use the Forescout Platform primarily for asset management.View full review »
Products & Solutions Manager Cyber Security | Forensics at a tech services company with 201-500 employees
I am a freelance cybersecurity consultant. I provide and implement products for our clients.View full review »
Senior Manager Network Design at a tech services company with 501-1,000 employees
Forescout Platform can be deployed on the cloud or on-premise.
When we have a large enterprise environment with a lot of users, different security policies are to be applied in certain situations and locations. This is where the Forescout Platform is used. If we have some compliance requirements to have the NAC solution in place, we prefer the Forescout Platform over other solutions.View full review »
Product Manager - IT Security at a tech services company with 11-50 employees
Our primary use case is for device compliance and access control.View full review »
Consultant at a tech services company with 51-200 employees
The use case is for a compliance check for the users who get into your organization. We identify the host for Windows PC, Mac, Linux, and servers. These are some of the use cases for user control and policy management. Some of the other use cases are to kill some applications and peer-to-peer applications. It's mainly for visibility and control, and we also integrate with various firewalls and other system security solutions. For example, LogRhythm, Splunk, Qreader, McAfee Orchestrator, and Trend Micro.
I work on multiple technologies and security technology. The solution is deployed on-premise. We don't use it for our own company. We are the system integrators and we deploy for various customers across the region we work with and we deploy most of the verticals.View full review »
Senior Advisor/Architect at a consultancy with 51-200 employees
Our primary use case of this solution was to control which of our devices were connected to the network. I'm a senior architect advisor. We were customers of Forescout.View full review »
We are using the Forescout Platform for authentication and for 100% device visibility.View full review »
We're Forescout partners and offer this as a solution to our clients.View full review »
We are a solution provider and we are currently implementing this product for our customers.
One of the reasons we use Forescout is to differentiate between our employees and guests in the office. For employees, we want to make sure that all of the Wi-Fi devices connected to our infrastructure comply with our security regulations. For guests, or for subcontractors, our goal is to monitor and regulate access.
This also provides us with the ability to use automation during our compliance and review. For example, we can automate processes with third-party solutions such as Splunk, or our own firewall can have an automatic response based on the compliance results from Forescout.View full review »
It's a Network Access Control tool.View full review »
This solution can be used to organize guest portals, integrate switches, and create policies. Some of its standard use cases also include completing key process upgrades and anti-virus of Windows OS.