• slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide


Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. As of December 31, 2019, more than 3,700 customers in over 90 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity. Learn how at www.forescout.com


  • eyeSight

    Complete device visibility. Continuously discover, classify and assess devices without agents or active techniques that could compromise business operations. Read Datasheet.

  • eyeSegment

    Transforming Enterprise. Wide Network Segmentation - Accelerate the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk. Download Datasheet.

  • eyeControl

    Enforce and automate policy-based controls. Take action to mitigate threats, incidents and compliance gaps. Download What’s New!

  • eyeExtend

    Extend the value of your security and IT investments. eyeExtend products share device context between the Forescout platform and other IT and security products to automate policy enforcement across disparate solutions and accelerate system-wide response to mitigate risks.

  • eyeManage

    Centralized configuration, management and monitoring. Gain a single-pane-of-glass view for every network-connected device. Unify asset, compliance and risk reporting across the extended enterprise. Download Datasheet.

  • eyeRecover

    Service continuity and resiliency for single- or multi-site deployments.

  • Forescout Extended Modules

    Forescout Extended Modules extend the capabilities of CounterACT to a vast range of system infrastructure and third-party security management tools. Orchestrate more.

Demo Desk

Join our Forescout Demo Jock for a brief overview on how Forescout can agentlessly provide over 150 characteristics about every IP Connected Device on your network - BYODs, IOTs, and OTs included - and then use that information for dynamic network segmentation. This Demo Desk will display how Forescout helps every team automate threat response, maintain compliance, and get information about every asset on their network in real time, even as those devices change.

Join us for upcoming sessions!

Test Drive

Test Drive

Experience Forescout 8.2—virtually

In these challenging times, in-person demos are out of the question, but we have a solution: the Forescout Virtual Test Drive. It’s a hands-on, condensed tour of Forescout 8.2 that highlights the latest platform updates—including Forescout eyeSegment capabilities. In just 90 minutes on the Tuesday morning or afternoon of your choice, you’ll take four laps covering device visibility, asset management, incident response, and network segmentation. Learn how to quickly identify high-risk devices and act—faster.

Experience the Forescout before-and-after difference—the difference that lets you dramatically mitigate risk across your extended enterprise and protect your organization. Put the Forescout platform through its paces. Register now and select the date and time that works best for you.



Upcoming Dates 


Past Dates

  • June 16
  • June 9
  • June 2
  • May 26
  • May 19
  • December 10
  • January 9 | 11:30am | Sacramento, CA

If you have any questions about an event that has passed, please feel free to reach out to Forescout@carahsoft.com


How to Jumpstart Your NIST Cybersecurity Framework Maturity: Recover Function

April 8, 2020

In this final post of our series, we’ll discuss the fifth Function of the NIST Cybersecurity Framework, Recover. This Function requires organizations to develop and implement activities to restore capabilities or services that were impaired due to a cybersecurity event. To comply, organizations need to put a recovery plan into place to get back to their last “known good” state, be able to coordinate restoration activities with external parties and incorporate lessons learned into an updated recovery strategy. Learn More...

Inability to Account for Networked Assets Will Hinder Defense Contractors’ Achievement of CMMC

April 6, 2020

Forescout is actively engaged with the defense contractor community to implement Cybersecurity Maturity Model Certification (CMMC) controls. Forescout’s core capabilities that are of particular interest to defense contractors considering the CMMC include: identifying and assessing devices on networks, controlling access to and within the network and addressing many found vulnerabilities—whether by directly remediating, initiating remediation actions or quarantining devices. In Forescout’s experience, most defense contractors lack awareness of approximately fifty percent of the connected devices on their networks before they deploy the Forescout platform. Learn More...

5 Questions for It Professionals to Adapt to Today’s Remote Working Environment

March 24, 2020

We are in unprecedented times, navigating a new reality where business is largely being conducted remotely, outside of a secure office network. As strange as it feels to many, it’s something I’ve been preparing for over 10 years. In 2009, I was part of a team that built the UK Pandemic Flu service designed to provide clinical evaluations for a vaccine in the event of an outbreak. My team worked alongside the UK Chief Medical Officer to better understand how to create a resilient IT service and support function to operate during a pandemic outbreak. Today, it feels surreal that many of those theoretical implications are now coming true. Learn More...

Keeping Our Forescout Family Secure During COVID-19

March 19, 2020

While we’re restricting travel and working remotely, we want to help you with your security needs so you can stay focused on what is most important – the health and safety of your teams, family and friends. Whether it is to secure your remote access program, ensure onsite and offsite device hygiene, or automate tasks due to reduced IT capacity, we’re here to support our customer and partner community. Learn More...

Embracing Zero Trust for IOT and OT: A Fundamental Mind Shift

March 18, 2020

Securing any network begins with understanding every connected user and device and every bit of data they are trying to access. This is a basic premise of any security framework—including Zero Trust. Clearly, you need to know who is trying to access what before you can create appropriate enforcement policies and controls. Learn More...

A Healthy Hospital Is Founded on 5 Key Cyber Principles

March 5, 2020

Today, running a healthy hospital means much more than curing diseases and fixing broken bones. It also means making sure the underlying technology is strong and secure enough to support those operations. Hospitals, clinics, and other healthcare organizations are adding more connected devices to their networks than ever before. These devices add significant benefits, like the increased ability to monitor patients with real-time results from medical scans. Learn More...

COVID-19 Should Prompt Enterprises to Move Quickly to Zero Trust

COVID-19 makes organizations confront the reality that their network boundaries no longer end with their own infrastructure but now extend to employees’ homes. Underscoring this is the Office of Management and Budget’s request that federal agencies “offer maximum telework flexibilities to all current telework eligible employees, consistent with operational needs of the departments and agencies.” To maintain continuity of operations, government organizations must move toward a new network security paradigm that distrusts all devices and users and denies them access to network resources until they have demonstrated the requisite level of security and authorization. That strategic initiative is called “zero trust.” Learn More...

Count on Carahsoft

Forescout is an enterprise device visibility platform that agentlessly ensures compliance and proper network segmentation for all IPs within the network. The platform provides 100% visibility out of the box and with that information can then ensure all behavior is normal or within limits across the network. This works across VPNs, traditional IT devices, IoTs, BYODs, and OTs. With control actions, the platform can then do agentless network access control and complete device traffic management.

For more information on discounts and special contract terms, please contact the Forescout team at Forescout@carahsoft.com or call 1-833-372-8468.





GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025


Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

ForeScout ESI BPA Contract #N66001-18-A-0005

Dec 21, 2017- Dec 20, 2022

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Educational Software Solutions and Services - OMNIA Partners, Public Sector

Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


Oct 20, 2015- Sep 03, 2025

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022


May 02, 2014- Dec 19, 2021


Archived Events


Latest News

Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S. Department of Defense (DoD) to expand cybersecurity across its global enterprise ...
Forescout Technologies, Inc. (NASDAQ:FSCT), the leader in device visibility and control, today announced a strategic partnership with Medigate, a dedicated medical device security and asset management ...
By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.
The recently passed National Defense Authorization Act requires the Department of Defense to compare the capabilities of its Comply-to-Connect initiative (C2C) to those that the Department of Homeland ...
ForeScout Technologies (NASDAQ: FSCT), a leading Internet of Things (IoT) security company, today announced new foundational innovations in ForeScout CounterACT® 8 that raise the bar on device ...
Defense Information Systems Agency publishes influential STIG validation for ForeScout, documenting its proven technology to provide visibility and control of evolving, IoT-driven systems
ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, today announced that the U.S. Department of Defense (DoD) awarded the company and its federal partners an ...



Read this blog post by Dean Hullings, Global Defense Solutions Strategist at Forescout, to learn more about how Forescout engages with the defense contractor community to implement Cybersecurity Maturity Model Certification (CMMC) controls.

Case Study

To fulfill its mission of improving access to quality healthcare for Californians, the Office of Statewide Health Planning and Development (OSHPD) certifies the safety of hospital and skilled nursing facilities, offers financial assistance to individuals and healthcare institutions and collects and ...


Forescout Technologies Inc Datasheet
SilentDefense is a non-intrusive network monitoring and situational awareness platform that provides in-depth visibility and cyber resilience for industrial control systems (ICS) and SCADA networks.SilentDefense protects ICS/SCADA networks from a wide range of threats. It combines patented anomaly d...

Forescout Technologies Inc Datasheet
Continuously discover, classify and assess devices to gain situational awareness and reduce risk.

Forescout Technologies Inc Datasheet
Enforce and automate policy-based controls to proactively reduce your attack surface and rapidly respond to incidents.

Forescout Technologies Inc Datasheet
Centrally manage Forescout deployments across your extended enterprise.

Forescout Technologies Inc Datasheet
Forescout eyeInspect provides in-depth device visibility for OT networks and enables effective, real-time management of a full range of operational and cyber risks.


Forescout Technologies Inc Resources
Continuously assess, monitor and enforce policies to reduce risks. This solution brief will highlight the challenges and potential solutions for device compliance while working remote.

Forescout Technologies Inc Resources
What is a Command Cyber Readiness Inspection (CCRI)? A CCRI is a comprehensive review of a Department of Defense (DoD) entity’s cybersecurity posture that includes a detailed assessment of its Information Assurance programs, the non-classified and classified IP networks, and the critical cyber and...

Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S. Department of Defense (DoD) to expand cybersecurity across its global enterprise as the initial phase of a multi-million dollar contract award through 2020.