94

FORESCOUT COUNTERACT 10000 USERS

Mfg. Part: CT10000/A | CDW Part: 3016763
Request Pricing
Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
800.800.4239
Mon-Fri 7am-7:30pm CT
Availability:8-10 days
Orders placed today will ship within 10 days
Product Reviews
FORESCOUT COUNTERACT 10000 USERS is rated 4.0 out of 5 by 15.
Rated 4 out of 5 by from We like that it can do network access control either with 802.1x or without 802.1x since many network devices are not ready to do 802.1x. Valuable Features:The most valuable features of ForeScout is the fact that it can do network access control either with 802.1x or without 802.1x. Many network devices are not ready to do 802.1x. Lots of endpoints are not ready to do it, or they're poor at it, so having a non-.1x solution is critical for maintaining stability on our network.Improvements to My Organization:We did not have a NAC prior to ForeScout. It provides constant monitoring of the endpoints either through an agent or periodic monitoring with a local admin account. This makes posturing very easy to do. Once the device is on the network, we're able to determine, does it continue to meet the requirements that we need for a device to stay on the network?Room for Improvement:Definitely, having more third-party integration would be an improvement. This is something that they're doing. Other products that we have on our network, if we're able to get ForeScout to talk with them, we'll get much better information to those products, things like Splunk and other data gathering.Also, I think we have Rapid7, so all these different programs that want to collect a lot of information, ForeScout is able to do that. So having it being able to talk to them, the more it can talk to, the better it is.I think there are some product maturity issues in terms of the web interfaces that its able to present for end users. They're working on those. Those are improving, and just other features that come along with them growing into this space that they have. They're getting feedback from us, and they're getting feedback from other very large customers on what to do to improve, and they respond very well.Use of Solution:2 yearsDeployment Issues:We've had no issues with deployment.Stability Issues:We had a few issues that were unique to our environment, but ForeScout tech support has been very timely in being able to respond to them and getting us support we needed. We have had to have a few reboots due to some outages, but again, these are things that were able to be resolve very quickly. Overall, I would say that this is a stable solution.Scalability Issues:We're a huge company, over 100,000 employees, and it does require that we have done our homework ahead of time -- that we know where our address space is, that we know what's out there, and being able to come up with a deployment plan is our responsibility. Once we had that, we were able to go with it, and it works very well.Customer Service:Very good.Technical Support:Very good.Initial Setup:Device setup is straightforward - NAC itself is always a complex thing due to its profiling of EVERY device that connects to the network.Implementation Team:The ForeScout engineers were there to help us without the standard, "Oh, you have over 100,000 endpoints? Well here's what every 100,000-endpoint company does."Other Solutions Considered:We compared ForeScout to Cisco ISE. There were some other vendors in this space, but we felt they were for mid-sized companies at largest. Cisco looked like they had an offering that would be able to compete head-to-head with it in terms of size. The reason we picked this over ISE was because ForeScout had a non-802.1x solution for the wired network. We would avoid a lot of chaos and a lot of destruction if we go that route. Also, ForeScout had fewer vulnerabilities whereas Cisco ISE had several level-10 vulnerabilities that have been observed over the years. While we were testing it, two of them came out.ForeScout has never had a vulnerability above 7.0, so when we look at the security of the system, it definitely meets that requirement where this is not something that's going to be compromised the way it looked, as though Cisco ISE had some potential for that. Much less disruptive, both Cisco ISE and ForeScout really require a client to get the full features of the system. They say that it can run client-less, but having the client gives a lot better functionality, and the ForeScout client just worked a lot better for us on our endpoints.Other Advice:The most important thing would be that a NAC project involves more than just the network. You've got to have client people, PKI people, active directory people all working together with the network to make this product work and make it happen. There's so many ways that it could interrelate. If you're in a very large company, you've got to break down the silo walls and get everybody together from the beginning to make this thing work out, but once you have those people together, this is something that every group wants to have. Desktop people want it, the mobile people want it, the scanning people. Everybody wants it once they see it, so it does sell itself, but you've got to have that education meeting up front.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-01-16
Rated 3 out of 5 by from We're able to defend against unauthorized access to the network, thus distinguishing between corporate users and guests. But, detection and control of dual-homed devices needs improvement. Valuable Features:This product provided a really good effect in terms of network access control. With the ForeScout NAC, distinguishing guests and corporate staff was easier.This was very easy to achieve since the product integrates really well with Active Directory and the NMAP feature discovers all endpoints within the network.Improvements to My Organization:With the use of the NAC solution from ForeScout, the company was able to defend against unauthorized access to the network, thereby thoroughly distinguishing who is a Corporate user and who is a Guest. Process for Guest Registration (if implemented properly) was also easy.Room for Improvement:Detection and control of Dual-Homed devices needs to be improved, as the product sometimes gives false positives. Also, more custom policies should be made available.Use of Solution:I used this solution for 14 months.Deployment Issues:There were issues of false positives whenever a new hotfix was installed even with the GA release. There was actually an issue where an upgrade to a new version of the hotfix plugin increased the CPU optimization and network bandwidth usage.Scalability Issues:ForeScout is scalable since a management device is available to manage other CT boxes.Technical Support:Technical support from ForeScout is pretty good, with escalations made promptly when needed.Previous Solutions:No previous solution.Initial Setup:The initial setup was straightforward, as the steps were simple to understand. It only got complex when creating policies that are not simple.Implementation Team:I worked for a vendor team, and for any client ready to implement this product, I would recommend that the necessary requirements for deployment should be done before the team arrives to start implementation. This makes deployment less stressful.Other Solutions Considered:No other options were evaluated.Other Advice:If you are looking for a NAC solution which works without the use of agents, I would say ForeScout is the one to go for.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-11-23
Rated 5 out of 5 by from It prevents scanning, malware spread, corporate asset misuse, and reconnaissance on our network by third-party devices. Valuable Features:* Network Access Control, it's core use* Asset Intelligence for deskside* "What port is it plugged into" intelligence for deskside* Patch-level intelligence for the Patch Management team* "What PC is a user on" for helpdesk/IT security/deskside* It's highly used across our departmentImprovements to My Organization:* Immediate relocation of network devices to segregated "Vendor" network based on autonomous analysis. Prevents scanning, malware spread, corporate asset (i.e. printer) misuse, and reconnaissance on our network by third-party devices. Allows us to block VPN from our corporate network but still allow Vendors to establish them.* Better information provided by Level 1 support (helpdesk) regarding asset information as we provide them with R/O access to the tool* Visitor policy communication & acceptanceRoom for Improvement:* JAVA Memory management - leaving the app running for multiple days requires relaunch* Search - needs boolean functionality* Search - If a console user right click/pastes their clipboard contents into the search field (ie: IP address) the field fails to clear the "Search" word in the field, resulting in the search string of "Search172.0.0.1". Typing in the field does not result in this issue. - FIXED!Use of Solution:3 YearsDeployment Issues:No issues encountered.Stability Issues:Stability has been good.Scalability Issues:* Currently scaling out to international operations* It is very scalable, allowing additional strategic appliances as required in either physical or VMs.* We control ~150 field sites and two major metro sites with three appliances.Customer Service:It's excellent.Technical Support:It's excellent.Previous Solutions:No previous solution was used.Initial Setup:It was straightforward, although I recommend having a strong relationship with network-asset owners to ensure SNMP rights are looked after.Implementation Team:We used a vendor, Conexsys (Graham Cheng & Jerry G), who were excellent.Cost and Licensing Advice:It's not a cheap tool, but it's very useful and effective.Other Solutions Considered:This was chosen without hands-on evaluation based on reviews and industry feedback.Other Advice:If you have distributed services (DHCP), strategically ensure you generate reliable traffic to establish timely inspections. We've avoided the use of traps by centralizing our DHCP at HQ, but it causes black holes during inspection schedules in case of a static device being plugged in.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-10-03
Rated 4 out of 5 by from We like that it can do network access control either with 802.1x or without 802.1x since many network devices are not ready to do 802.1x. Valuable Features:The most valuable features of ForeScout is the fact that it can do network access control either with 802.1x or without 802.1x. Many network devices are not ready to do 802.1x. Lots of endpoints are not ready to do it, or they're poor at it, so having a non-.1x solution is critical for maintaining stability on our network.Improvements to My Organization:We did not have a NAC prior to ForeScout. It provides constant monitoring of the endpoints either through an agent or periodic monitoring with a local admin account. This makes posturing very easy to do. Once the device is on the network, we're able to determine, does it continue to meet the requirements that we need for a device to stay on the network?Room for Improvement:Definitely, having more third-party integration would be an improvement. This is something that they're doing. Other products that we have on our network, if we're able to get ForeScout to talk with them, we'll get much better information to those products, things like Splunk and other data gathering.Also, I think we have Rapid7, so all these different programs that want to collect a lot of information, ForeScout is able to do that. So having it being able to talk to them, the more it can talk to, the better it is.I think there are some product maturity issues in terms of the web interfaces that its able to present for end users. They're working on those. Those are improving, and just other features that come along with them growing into this space that they have. They're getting feedback from us, and they're getting feedback from other very large customers on what to do to improve, and they respond very well.Use of Solution:2 yearsDeployment Issues:We've had no issues with deployment.Stability Issues:We had a few issues that were unique to our environment, but ForeScout tech support has been very timely in being able to respond to them and getting us support we needed. We have had to have a few reboots due to some outages, but again, these are things that were able to be resolve very quickly. Overall, I would say that this is a stable solution.Scalability Issues:We're a huge company, over 100,000 employees, and it does require that we have done our homework ahead of time -- that we know where our address space is, that we know what's out there, and being able to come up with a deployment plan is our responsibility. Once we had that, we were able to go with it, and it works very well.Customer Service:Very good.Technical Support:Very good.Initial Setup:Device setup is straightforward - NAC itself is always a complex thing due to its profiling of EVERY device that connects to the network.Implementation Team:The ForeScout engineers were there to help us without the standard, "Oh, you have over 100,000 endpoints? Well here's what every 100,000-endpoint company does."Other Solutions Considered:We compared ForeScout to Cisco ISE. There were some other vendors in this space, but we felt they were for mid-sized companies at largest. Cisco looked like they had an offering that would be able to compete head-to-head with it in terms of size. The reason we picked this over ISE was because ForeScout had a non-802.1x solution for the wired network. We would avoid a lot of chaos and a lot of destruction if we go that route. Also, ForeScout had fewer vulnerabilities whereas Cisco ISE had several level-10 vulnerabilities that have been observed over the years. While we were testing it, two of them came out.ForeScout has never had a vulnerability above 7.0, so when we look at the security of the system, it definitely meets that requirement where this is not something that's going to be compromised the way it looked, as though Cisco ISE had some potential for that. Much less disruptive, both Cisco ISE and ForeScout really require a client to get the full features of the system. They say that it can run client-less, but having the client gives a lot better functionality, and the ForeScout client just worked a lot better for us on our endpoints.Other Advice:The most important thing would be that a NAC project involves more than just the network. You've got to have client people, PKI people, active directory people all working together with the network to make this product work and make it happen. There's so many ways that it could interrelate. If you're in a very large company, you've got to break down the silo walls and get everybody together from the beginning to make this thing work out, but once you have those people together, this is something that every group wants to have. Desktop people want it, the mobile people want it, the scanning people. Everybody wants it once they see it, so it does sell itself, but you've got to have that education meeting up front.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-08-09
Rated 5 out of 5 by from It prevents scanning, malware spread, corporate asset misuse, and reconnaissance on our network by third-party devices. Valuable Features:* Network Access Control, it's core use* Asset Intelligence for deskside* "What port is it plugged into" intelligence for deskside* Patch-level intelligence for the Patch Management team* "What PC is a user on" for helpdesk/IT security/deskside* It's highly used across our departmentImprovements to My Organization:* Immediate relocation of network devices to segregated "Vendor" network based on autonomous analysis. Prevents scanning, malware spread, corporate asset (i.e. printer) misuse, and reconnaissance on our network by third-party devices. Allows us to block VPN from our corporate network but still allow Vendors to establish them.* Better information provided by Level 1 support (helpdesk) regarding asset information as we provide them with R/O access to the tool* Visitor policy communication & acceptanceRoom for Improvement:* JAVA Memory management - leaving the app running for multiple days requires relaunch* Search - needs boolean functionality* Search - If a console user right click/pastes their clipboard contents into the search field (ie: IP address) the field fails to clear the "Search" word in the field, resulting in the search string of "Search172.0.0.1". Typing in the field does not result in this issue. - FIXED!Use of Solution:3 YearsDeployment Issues:No issues encountered.Stability Issues:Stability has been good.Scalability Issues:* Currently scaling out to international operations* It is very scalable, allowing additional strategic appliances as required in either physical or VMs.* We control ~150 field sites and two major metro sites with three appliances.Customer Service:It's excellent.Technical Support:It's excellent.Previous Solutions:No previous solution was used.Initial Setup:It was straightforward, although I recommend having a strong relationship with network-asset owners to ensure SNMP rights are looked after.Implementation Team:We used a vendor, Conexsys (Graham Cheng & Jerry G), who were excellent.Cost and Licensing Advice:It's not a cheap tool, but it's very useful and effective.Other Solutions Considered:This was chosen without hands-on evaluation based on reviews and industry feedback.Other Advice:If you have distributed services (DHCP), strategically ensure you generate reliable traffic to establish timely inspections. We've avoided the use of traps by centralizing our DHCP at HQ, but it causes black holes during inspection schedules in case of a static device being plugged in.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-08-03
Rated 5 out of 5 by from As a university, we have used ForeScout to help us get a hold on student computers and their infections. Valuable Features:As a university, we have used ForeScout to help us get a hold on student computers and their infections, and to keep those infected systems off our network. We are also currently using ForeScout as a mechanism to allow us to automatically move student game consoles to a separate VLAN, and then move the port back to the primary dorm VLAN when a PC or other device is plugged in.Improvements to My Organization:ForeScout has the built-in ability to identify network devices without a separate subscription or device, and that allows us to identify when students plug into a switch or router (not allowed on our network), or tries to put their computer on the less restrictive game console VLAN. The rule sets allow you to configure different rules for different devices or networks from a single location, and provides a single-pane-of-glass view into any network traffic it can see.Room for Improvement:The configuration of the rules is both a blessing and a curse. While it is almost infinitely configurable, knowing how to get the product to do what you want it to do can be difficult, especially at first.The biggest problem we have had with ForeScout is that in order for it to see all of your network traffic it must have access to that traffic. So if your traffic has multiple ways to reach the internet or other resources, then you need multiple network taps in place to see that traffic.Use of Solution:We have used ForeScout since summer of 2012.Deployment Issues:Other than the infinite configurability and need to have multiple network taps to see all traffic, we haven't had issues with deployment.Stability Issues:Stability has been like a rock, and it is a product that just seems to work.Scalability Issues:We have had no issues with scaling it for our needs.Technical Support:We have had mixed success with support. Sometimes we had amazing people who knew just what we needed and how to help us get there with minimal fuss. Other times we were explaining to support how to work around an issue so other customers wouldn’t have to deal with what we were dealing with.Previous Solutions:We previously used Perfigo, which was later bought by Cisco and became Clean Access. ForeScout offered us a device with a 10GB connection, and that on top of the feature set for the price sealed the deal.Initial Setup:The initial setup was very straightforward, but due to our backbone switch/network configuration, we had to make last minute tweaks to get the product to see all our traffic. Also, we struggled to get our rules properly configured so that students weren’t negatively impacted by misconfigurations that would either prevent them from getting on the network at all, or repeatedly require them to log in.Our third-party consulting firm (Konsultek), hit one out of the park in helping us, and they made sure we were up and running before the start of school, despite our tight timeframe for implementation.Implementation Team:We used a third-party group to assist us with implementation, and that made all the difference for us as we were able to pull from their experience and knowledge to help us get up and running.Other Advice:The best advice I can offer is to make sure to understand the rules and how they work as that was a bit of an issue for us in the first few weeks when we worked out how to “fix” some of the issues (client time-outs, repeatedly being asked to log in) as they came up. Also, test everything before rolling out to production.ForeScout provides some of the greatest visibility into network traffic, showing you exactly who is doing what, down to the port and protocol being used, capturing entire conversations between endpoints. It is a simply fantastic tool that provides network and security persons with the ability to throw up honeypots.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-04-14
Rated 3 out of 5 by from The most valuable feature for us is the real-time alerting of newly connected devices. The reporting could be a bit more intuitive and user friendly. Valuable Features:The most valuable feature for us is the real-time alerting of newly connected devices, whether they are approved or unapproved devices on our network.Improvements to My Organization:Since our implementation of CounterACT, it has kept us aware of unapproved devices attempting to connect to our network which pose security threats.Room for Improvement:The reporting could be a bit more intuitive and user friendly.Use of Solution:I have used CounterACT for two years.Deployment Issues:There were many issues with deployment, but these were largely due to our own network architecture issues.Stability Issues:There were many issues with stability, but these were largely due to our own network architecture issues.Scalability Issues:There were many issues with scalability, but these were largely due to our own network architecture issues.Technical Support:I'd rate ForeScout's technical support as fair-to-good.Previous Solutions:We did not have a previous NAC solution in place prior to CounterACT.Initial Setup:The initial setup was complex.Implementation Team:We used a vendor team for the implementation.Other Advice:Do your homework ahead of time. Ensure that you have up-to-date network maps and that understand your network's architecture.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-04-01
Rated 4 out of 5 by from You can use it to implement 802.1x on your infrastructure and also have a very granular control of your devices, including shadow devices. Valuable Features:The most important feature is that this solution works well without a 802.1x feature. You can use CounterACT to implement that feature and also have a very granular control of your devices, including shadow devices.Improvements to My Organization:We were searching for a solution that could help us not only to detect and manage unauthorized access, but also to implement 802.1x on our infrastructure. And when we were working to reach that goal, we found other improvements from using CounterACT, such as antivirus installation, P2P control, and shadow IT -- and that's another plus for them.Room for Improvement:The best improvement they could make would be reporting and better integration with AD. Last but not least, a management web interface would be nice in the next version/release.Use of Solution:We've used it for about a year.Deployment Issues:We had no issues with the deployment.Stability Issues:We have an HA cluster in place that works very well. We've had no issues with stability.Scalability Issues:We had no issues scaling it for our needs.Technical Support:Fortunately, for now, we've had no need to call technical support.Previous Solutions:We didn't have a NAC solution in place. This is the very first solution we've tried mostly because other solutions have 802.1x as a mandatory requirement.Initial Setup:It was not so easy to deploy in our environment, the learning curve for this solution is quite hard.Implementation Team:From my experience, it is impossible to implement this kind of solution in-house. You need a consultant or a trained person who can do this job.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-03-27
  • y_2017, m_3, d_30, h_18
  • bvseo_bulk, prod_bvrr, vn_bulk_1.0.0
  • cp_1, bvpage1
  • co_hasreviews, tv_0, tr_15
  • loc_en_US, sid_3016763, prod, sort_[SortEntry(order=SUBMISSION_TIME, direction=DESCENDING), SortEntry(order=FEATURED, direction=DESCENDING)]
  • clientName_cdw
 
Adding to Cart...
3/30/2017 7:46:03 PM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.