Forescout

Forescout

Forescout Technologies
+
+

Related Products

  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • Syncro
    538 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • Cloudflare
    1,915 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website

About

Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. Designed for scalability, Forescout's platform provides insights that empower businesses to mitigate risks and enhance their security posture across various industries, from healthcare to manufacturing.

About

Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

CIOs, IT security teams, and businesses seeking comprehensive, scalable cybersecurity solutions for managing risks across diverse IT, IoT, and operational technology environments

Audience

IT Professionals and Network Professionals in need of an advanced Intrusion Detection and Prevention solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Forescout Technologies
Founded: 2000
United States
www.forescout.com

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/intrusion-prevention-system/

Alternatives

Alternatives

Auconet BICS

Auconet BICS

Auconet
UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC
Venusense IPS

Venusense IPS

Venusense

Categories

Categories

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Integrations

CYREBRO
Nexpose
Armis Centrix
Carbon Black EDR
CyberArk Endpoint Privilege Manager
Cylera Platform
Cynerio
Google Digital Risk Protection
Mandiant Managed Defense
Medigate
Microsoft Defender for IoT
NorthStar Navigator
Optiv Managed XDR
Panaseer
Seemplicity
Sepio
TYCHON
Tenable One
Vectra AI
VirtualArmour

Integrations

CYREBRO
Nexpose
Armis Centrix
Carbon Black EDR
CyberArk Endpoint Privilege Manager
Cylera Platform
Cynerio
Google Digital Risk Protection
Mandiant Managed Defense
Medigate
Microsoft Defender for IoT
NorthStar Navigator
Optiv Managed XDR
Panaseer
Seemplicity
Sepio
TYCHON
Tenable One
Vectra AI
VirtualArmour
Claim Forescout and update features and information
Claim Forescout and update features and information
Claim Trellix Intrusion Prevention System and update features and information
Claim Trellix Intrusion Prevention System and update features and information