{"id":7889,"date":"2023-04-08T00:21:25","date_gmt":"2023-04-08T00:21:25","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/07\/07\/forescout-counteract-nac-product-overview-and-insight\/"},"modified":"2023-06-06T15:58:19","modified_gmt":"2023-06-06T15:58:19","slug":"forescout-nac-review","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/","title":{"rendered":"Forescout Platform: NAC Product Review"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>As a pioneer in the network access control (NAC) market, Forescout understands that their customers will need to detect and control a wide variety of endpoints and applications. Forescout\u2019s Platform not only enables robust NAC capabilities, but also offers options for enhanced security, including eXtended Detection and Response (XDR).<\/p>\n<p>Most importantly, Forescout\u2019s agnostic Platform works with both a wide variety of networking vendors, device vendors, and security tools. This wide compatibility enables rapid deployment with minimal issues to sprawling networks with a variety of networking equipment.<\/p>\n<p><em>To compare the Forescout Platform against competitors, see our complete list of <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\"><em>top network access control (NAC) solutions<\/em><\/a><em>.<\/em><\/p>\n<h2><strong>Who is Forescout?<\/strong><\/h2>\n<p>In 2000, Forescout entered the security market as an NAC provider and then expanded capabilities to encompass more security and asset control features. Customers for the privately-held customer include Fortune 100 organizations and government agencies.<\/p>\n<h2><strong>Forescout Platform<\/strong><\/h2>\n<p>The Forescout platform replaces the legacy CounterACT product to provide broader security capabilities. The Platform hosts a collection of products that combine to provide more than basic network access control.<\/p>\n<p>Basic NAC Tools:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyecontrol\/\" target=\"_blank\" rel=\"noopener\">eyeControl<\/a> enforces and automates policy-based controls to reduce the impact of threats, incidents, and compliance gaps<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\" target=\"_blank\" rel=\"noopener\">eyeSegment<\/a> enables network segmentation and logical security zones at a granular level for basic security or to enable <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Zero Trust Network Architecture<\/a> (ZTNA)<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyesight\/\" target=\"_blank\" rel=\"noopener\">eyeSight<\/a> (the fundamental NAC license) discovers, classifies, and assesses the compliance posture of IP-based devices continuously as they establish a connection to the network without requiring agents<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/solutions\/medical-device-security\/\" target=\"_blank\" rel=\"noopener\">Medical Device Security<\/a> provides specialized discovery and risk analysis for connected medical equipment<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/forescout-eyemanage-datasheet\/\" target=\"_blank\" rel=\"noopener\">eyeManage<\/a> provides management over other Forescout appliances and will be needed for larger deployments<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/forescout-eyerecover-datasheet\/\" target=\"_blank\" rel=\"noopener\">eyeRecover<\/a> backs up the Forescout deployment to improve resilience and availability<\/li>\n<\/ul>\n<p>Beyond NAC Tools:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.forescout.com\/products\/continuum-timeline\/\" target=\"_blank\" rel=\"noopener\">Continuum Timeline<\/a> creates a cloud-based repository of historical eyeSight device scans for analytics and compliance needs<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyeextend\/\" target=\"_blank\" rel=\"noopener\">eyeExtend<\/a> enables sharing device context between the Forescout Platform and other security tools (CrowdStrike, ServiceNow, Splunk, etc.) to accelerate security responses and automate workflows; note that separate licenses may be required for specific Forescout modules to connect to specific security tools<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyeinspect\/\" target=\"_blank\" rel=\"noopener\">eyeInspect<\/a> provides a specialty tool to protect Operational Technology (OT) that detects, classifies, and establishes baseline behavior characteristics for each industrial control system (ICS) and OT device.<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/solutions\/multifactor-risk-scoring\/\" target=\"_blank\" rel=\"noopener\">Multifactor Risk Scoring<\/a> consolidates common vulnerability information (CVE), device criticality, port information, internet exposure, and IP reputation to create robust risk evaluation for decision making<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/threat-detection-and-response-xdr\/\" target=\"_blank\" rel=\"noopener\">XDR<\/a> &#8211; supplies security operations centers (SOCs) with <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">eXtended Detection and Response<\/a> capabilities to enable more responsive security<\/li>\n<\/ul>\n<p>In addition to the NAC and Security tools, Forescout also offers outsourced expertise to assist with monitoring and response for XDR, medical devices, and IoT\/OT. Although the features beyond network access control and services can be valuable, they are beyond the scope of this review and will not be covered further here.<\/p>\n<h2><strong>Agents<\/strong><\/h2>\n<p>Forescout Platform is an <a href=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2018\/08\/Agentless-Visibility-and-Control-ForeScout-White-Paper.pdf\" target=\"_blank\" rel=\"noopener\">agentless solution<\/a>. An optional dissolvable agent (SecureConnector) is no longer offered or needed.<\/p>\n<h2><strong>Applicable Metric<\/strong><\/h2>\n<p>Up to 2 million devices can be configured and managed with eyeManage and sufficient appliances. <a href=\"https:\/\/docs.forescout.com\/en-US\/bundle\/admin-guide-8-1-x\/page\/admin-guide-8-1-x.Appliance-Capacity.html\" target=\"_blank\" rel=\"noopener\">Appliances will be limited<\/a> in the number of devices that each can manage by hardware capacity, available licenses, or both.<\/p>\n<h2><strong>Security Qualifications<\/strong><\/h2>\n<p>Forescout solutions have obtained <a href=\"https:\/\/www.forescout.com\/resources\/government-solution-brief\/\" target=\"_blank\" rel=\"noopener\">several different certifications<\/a> and compliances including:<\/p>\n<ul>\n<li>U.S. Department of Defense Information Network Approved Products List (DoDIN APL) for v8.X<\/li>\n<li>FIPS (Federal Information Processing Standards) 140-2<\/li>\n<li>National Information Assurance Partnership (NIAP) Common Criteria Certification for Forescout v8.1<\/li>\n<li>USMC ATO (Authority to Operate)<\/li>\n<li>U.S. Navy ATO (Authority to Operate)<\/li>\n<li>U.S. Army CoN (Certificate of Networthiness)<\/li>\n<\/ul>\n<p>Forescout also provides solutions and tips to comply with various compliance standards and government programs such as:<\/p>\n<ul>\n<li>Department of Homeland Security <a href=\"https:\/\/www.forescout.com\/resources\/next-phase-continuous-diagnostics-mitigation-cdm-solution-brief\/\" target=\"_blank\" rel=\"noopener\">Continuous Diagnostics and Mitigation<\/a> (CDM)<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/addressing-fisma-requirements-solution-brief\/\" target=\"_blank\" rel=\"noopener\">FISMA<\/a> (Federal Information Security Management Act)<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/hipaa-compliance-alignment-datasheet\/\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a> (Health Insurance Portability and Accountability Act)<\/li>\n<li>NIST (National Institute of Standards and Technology) <a href=\"https:\/\/www.forescout.com\/resources\/improving-nist-csf-maturity-with-the-forescout-platform\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Framework<\/a> (CSF)<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/pci-dss-mapping-guide-forescout-compliance\/\" target=\"_blank\" rel=\"noopener\">PCI-DSS<\/a> (Payment Card Industry Data Security Standard)<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/advanced-compliance-module-datasheet\/\" target=\"_blank\" rel=\"noopener\">SCAP<\/a> (Security Content Automation Protocol)<\/li>\n<\/ul>\n<h2><strong>Features<\/strong><\/h2>\n<p>The Forescout Platform NAC tools each provide specific features:<\/p>\n<ul>\n<li><a href=\"http:\/\/eyecontrol\" target=\"_blank\" rel=\"noopener\">eyeControl<\/a> Features\n<ul>\n<li><strong>Enforces least-privilege access<\/strong> for all managed and unmanaged devices<\/li>\n<li><strong>Granular enforcement access<\/strong> based on device classification, security posture, and user (employee, guest, contractor, etc.) combinations<\/li>\n<li><strong>Enables automated response<\/strong> to quickly and effectively contain threats based upon policy from moderate (move to guest network, assign to self-remediation VLAN, apply OS updates\/patches, etc.) to stringent (quarantine assets, turn off switch port, block access, disable network card, etc.)<\/li>\n<li><strong>Automated device compliance<\/strong> through compliance assessments and remediation workflows<\/li>\n<li><strong>Automated onboarding<\/strong> of new devices, including bring-your-own-device (BYOD) endpoints and guest users<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\" target=\"_blank\" rel=\"noopener\">eyeSegment<\/a> Features\n<ul>\n<li><strong>Simulate updated policies<\/strong> to determine how they will impact operations prior to activation<\/li>\n<li><strong>Enable Zero Trust<\/strong> initiatives with zones, groups, and micro-segmentation of the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> based upon users, devices, and applications<\/li>\n<li><strong>Real time monitoring<\/strong> of network segments to enable automated or rapid response to policy violations or security threats<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/products\/eyesight\/\" target=\"_blank\" rel=\"noopener\">eyeSight<\/a> Features\n<ul>\n<li><strong>Continuous monitoring and detection<\/strong> of devices in the enterprise as they connect to the network<\/li>\n<li><strong>Realtime asset inventories<\/strong> of physical and virtual devices including auto-classification for a wide variety of Internet of Things (IoT), Internet of Medical Technology (IoMT), Operations Technology (OT), cloud technologies, and industrial devices (IIoT)<\/li>\n<li><strong>Passive profiling and assessments<\/strong> of devices provides deep insight without impacting performance or uptime<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/solutions\/medical-device-security\/\" target=\"_blank\" rel=\"noopener\">Medical Device Security<\/a> Features\n<ul>\n<li><strong>Continuous detection<\/strong> of medical devices<\/li>\n<li><strong>Artificial Intelligence (AI) and Rule-based Risk Assessment<\/strong> of devices based upon network exposure, known attacks, and operational criticality<\/li>\n<li><strong>Customized access and enforcement<\/strong> for each connected medical device<\/li>\n<li><strong>Detailed reporting<\/strong> of security posture, alerts, and risk<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/forescout-eyemanage-datasheet\/\" target=\"_blank\" rel=\"noopener\">eyeManage<\/a> Features\n<ul>\n<li><strong>Unified device management and inventory<\/strong> across all deployments to consolidate data center, cloud, branch office, factory, IoT, and OT into one management window<\/li>\n<li><strong>Automated distribution<\/strong> of IP addresses, Forescout licenses, software upgrades and backups<\/li>\n<li><strong>Zero-touch provisioning<\/strong> of new appliances automates deployment expansion<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.forescout.com\/resources\/forescout-eyemanage-datasheet\/\" target=\"_blank\" rel=\"noopener\">eyeRecover<\/a> Features\n<ul>\n<li><strong>Failover clustering<\/strong> for physical and virtual appliances- even across geographically dispersed networks through cross-cluster and even cross-site failover<\/li>\n<li><strong>High availability<\/strong> <strong>pairing<\/strong> of active and standby appliances provide synchronized redundancy<\/li>\n<li><strong>Forescout device backups<\/strong> to maintain resilience and uptime through quick recovery of failed appliances<\/li>\n<\/ul>\n<\/li>\n<li><strong>Platform is also government certified<\/strong> FIPS 140-2, Common Criteria type, and more<\/li>\n<\/ul>\n<h2><strong>Pros<\/strong><\/h2>\n<ul>\n<li><strong>Real-time network visibility<\/strong><\/li>\n<li><strong>Clear user interface, easy to use<\/strong><\/li>\n<li><strong>Vendor agnostic<\/strong> and will integrate with a wide range of operating systems, endpoint software, networking equipment, and third-party security tools<\/li>\n<li><strong>Agentless out-of-band deployment<\/strong> avoids congestion or operation disruption<\/li>\n<li><strong>Includes 20+ passive and active <\/strong>discovery and profiling techniques that do not require agents<\/li>\n<li><strong>1,900+ Operating System <\/strong>versions recognized<\/li>\n<li><strong>7,700+ device vendors<\/strong> supported<strong>\u00a0<\/strong><\/li>\n<li><strong>400 medical technology <\/strong>vendors recognized and supported<\/li>\n<li><strong>Thousands of ICS<\/strong> (Industrial Control Systems) and automation devices that support manufacturing, energy, utilities, mining, and many other infrastructure industries<\/li>\n<li><strong>12 Million+ <\/strong>device fingerprints accessible from the Forescout Device Cloud<\/li>\n<li><strong>Active or Passive Inline Tap<\/strong> network connection options<\/li>\n<\/ul>\n<h2><strong>Cons<\/strong><\/h2>\n<ul>\n<li>Policies can be designed by users to be very complex which can be confusing and difficult to troubleshoot or establish<\/li>\n<li>Can be rigid and inconvenient in enforcement (security may see this as a positive)<\/li>\n<li>Expertise is required for troubleshooting<\/li>\n<li>Integration with network switching requires extra time and expertise<\/li>\n<li>Devices using multiple IP or MAC addresses (such as connecting via wireless routers and then via ethernet cable) will count as multiple devices<\/li>\n<li>Despite the availability of licensing guides, required licenses to implement NAC features are hard to understand<\/li>\n<\/ul>\n<h2><strong>Intelligence<\/strong><\/h2>\n<p>ForeScout uses automation for policy-based segmentation and enforcement of devices, users and applications. The Platform will integrate with security tools to share intelligence or the XDR module may be purchased to obtain more proactive security alerts.<\/p>\n<h2><strong>Delivery<\/strong><\/h2>\n<p>The Forescout Platform deploys on Forescout appliances or on licensed virtual machines. Each module may require one or more licenses and one or more virtual machines. Virtual devices may be deployed locally or in the cloud.<\/p>\n<h2><strong>Pricing<\/strong><\/h2>\n<p>Forescout does not publish pricing information directly, but does <a href=\"https:\/\/docs.forescout.com\/bundle\/licensing-sizing-guide\/resource\/licensing-sizing-guide.pdf\" target=\"_blank\" rel=\"noopener\">publish a licensing sizing guide<\/a> that covers hardware options and some software licensing. Partner pricing can be located, but may not reflect promotions, bulk discounts, or bundled pricing opportunities.<\/p>\n<p>Forescout Platform deploys on physical or virtual appliances. For small deployments, the Forescout license can be installed directly on the appliance, but for larger deployments one appliance will need to be dedicated as an eyeManage appliance to manage other Forescout appliances.<\/p>\n<p>The physical appliances are available with various combinations of copper and fiber ports. Price estimates here reflect copper ports; fiber port devices will be more expensive.<\/p>\n<p>The type of appliance depends upon the type of license sought. Forescout CT Series appliances can accept per-appliance licensing for the number of endpoint licenses needed. Most CT appliances are 1U (single server rack unit) appliances except for the small-factor CT-R appliance for the smallest deployments.<\/p>\n<ul>\n<li>CT-R, $4,800+, 4 ports, 100 device license<\/li>\n<li>CT-100, $13,300+, 6 ports, 500 device license<\/li>\n<li>CT-1000, $27,500+, 8 ports, 1,000 device device license<\/li>\n<li>CT-2000, $46,500+, 8 ports, 2,500 device device license<\/li>\n<li>CT-4000, $66,400+ 8 ports, 4,000 device device license<\/li>\n<li>CT-10000, $142,200+, 8 ports, 10,000 device license<\/li>\n<\/ul>\n<p>The Forescout 4100 and 5100 series physical appliances only support Flexx Licensing (see below) and the CT appliances can be upgraded to Flexx licensing in some circumstances. The 5110 appliance is a small form-factor desktop for extra-small deployments; others are 1U appliances.<\/p>\n<ul>\n<li>5110, $1,600+, minimal deployments<\/li>\n<li>5120, $7,800+, small deployments<\/li>\n<li>5140, $14,500+, medium deployments<\/li>\n<li>5160, $23,200+, large deployments<\/li>\n<\/ul>\n<p>Virtual appliance licenses include the Forescout virtual appliance, Forescout eyeManage, and the Console. Virtual Appliances are licensed based on the number of devices managed in five sizes: extra small (up to 100), small (up to 1,000), medium (up to 5,000), large (up to 10,000), and extra large (up to 20,000).<\/p>\n<p>Virtual appliances can be deployed in local data centers or in the cloud. Hybrid, or mixed local\/cloud networks require virtual private network (VPN) infrastructure between environments. For best operational performance, appliances should be deployed close to the devices managed.<\/p>\n<p>In addition to appliances, the <a href=\"https:\/\/www.forescout.com\/company\/legal\/product-category-guide\/\" target=\"_blank\" rel=\"noopener\">Forescout Platform modules are offered<\/a> in perpetual, term-based licenses of one or three years, or subscriptions. Perpetual and term licenses are available for eyeSight, eyeControl, and eyeRecover. Sufficient eyeSight licenses are required to license eyeControl, eyeExtend, eyeSegment, and other add-on modules.<\/p>\n<p>Licenses are based on the number of devices controlled where devices are counted by IP or MAC address. Devices include, but are not limited to:<\/p>\n<ul>\n<li>User endpoints (desktops, laptops, tablets, smartphones, etc.)<\/li>\n<li>Network infrastructure (switches, routers, wireless access points, etc.)<\/li>\n<li>Virtual and cloud instances (containers, servers, routers, etc.)<\/li>\n<li>IoT (printers, IP phones, security cameras, etc.)<\/li>\n<li>OT (sensors, conveyor belt motors, pumps, etc.)<\/li>\n<li>Medical Technologies (Ultrasound machines, heart monitors, etc.)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/licensing\/\" target=\"_blank\" rel=\"noopener\"><strong>Flexx Licensing<\/strong><\/a> enables flexible software-centric licensing to streamline license management, and enable easy deployment of additional licenses on-demand. Licenses can be obtained independently from appliances and pooled across appliances and networks segments. Virtual appliances can also be deployed and discontinued using Flexx. Sub-Scoping Licenses for specific portions of connected devices are available through Flexx Licensing and appliances in <a href=\"https:\/\/docs.forescout.com\/bundle\/licensing-sizing-guide\/resource\/licensing-sizing-guide.pdf\" target=\"_blank\" rel=\"noopener\">some circumstances<\/a>.<\/p>\n<p>Note that the total cost of ownership will not be limited to the licensed appliances and software. For example, if deploying the eyeSight module, no additional licenses may be required, but dedicated virtual hardware may need to be deployed for the Command Center and Monitoring Sensors. Forescout also sells dedicated physical hardware appliances for these needs. An organization will need to study documentation carefully or work with partners to determine the full environment required.<\/p>\n<h2>Bottom Line: Best NAC for Multi-Vendor Enterprise Networks<\/h2>\n<p>Growing organizations often evolve into sprawling multi-office networks with different types of networking equipment found in different regions. These networks only become more complicated when the company expands through multiple acquisitions.<\/p>\n<p>The Forescout Platform\u2019s ability to work across a wide variety of technologies enables large sprawling enterprises to use a single solution to manage and control network access world wide. This capability is further enhanced through compatibility with millions of potential endpoints from heart monitors to security cameras to industrial control systems.<\/p>\n<p>Organizations with a varied array of technologies should make sure to include Forescout\u2019s Platform in their short list of NAC technologies to consider.<\/p>\n<p><em>This article was originally written by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"><em>Drew Robb<\/em><\/a><em> on July 7, 2017<\/em><em>, and updated by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"><em>Chad Kime<\/em><\/a><em> on April 7, 2023.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6d5b880e39-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d5b880e39\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d5b880e39\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d5b880e39\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d5b880e39\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d5b880e39\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d5b880e39\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As a pioneer in the network access control (NAC) market, Forescout understands that their customers will need to detect and control a wide variety of endpoints and applications. Forescout\u2019s Platform not only enables robust NAC capabilities, but also offers options for enhanced security, including eXtended Detection and Response (XDR). Most importantly, Forescout\u2019s agnostic Platform works [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":20783,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[18684,21812],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378,377,375],"class_list":["post-7889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-nac","tag-network-access-control","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forescout Platform: NAC Product Review | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Forescout&#039;s Platform hosts NAC tools providing network visibility &amp; control. Explore features &amp; pricing now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forescout Platform: NAC Product Review | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Forescout&#039;s Platform hosts NAC tools providing network visibility &amp; control. Explore features &amp; pricing now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-08T00:21:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T15:58:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Forescout Platform: NAC Product Review\",\"datePublished\":\"2023-04-08T00:21:25+00:00\",\"dateModified\":\"2023-06-06T15:58:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\"},\"wordCount\":1961,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg\",\"keywords\":[\"NAC\",\"Network Access Control\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\",\"name\":\"Forescout Platform: NAC Product Review | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg\",\"datePublished\":\"2023-04-08T00:21:25+00:00\",\"dateModified\":\"2023-06-06T15:58:19+00:00\",\"description\":\"Forescout's Platform hosts NAC tools providing network visibility & control. Explore features & pricing now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forescout Platform: NAC Product Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forescout Platform: NAC Product Review | eSecurity Planet","description":"Forescout's Platform hosts NAC tools providing network visibility & control. Explore features & pricing now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/","og_locale":"en_US","og_type":"article","og_title":"Forescout Platform: NAC Product Review | eSecurity Planet","og_description":"Forescout's Platform hosts NAC tools providing network visibility & control. Explore features & pricing now.","og_url":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-08T00:21:25+00:00","article_modified_time":"2023-06-06T15:58:19+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Forescout Platform: NAC Product Review","datePublished":"2023-04-08T00:21:25+00:00","dateModified":"2023-06-06T15:58:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/"},"wordCount":1961,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg","keywords":["NAC","Network Access Control"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/","url":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/","name":"Forescout Platform: NAC Product Review | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg","datePublished":"2023-04-08T00:21:25+00:00","dateModified":"2023-06-06T15:58:19+00:00","description":"Forescout's Platform hosts NAC tools providing network visibility & control. Explore features & pricing now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/Forescout.jpg","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/forescout-nac-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Forescout Platform: NAC Product Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7889"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7889"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7889\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20783"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7889"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7889"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7889"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}