• slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide

Overview

Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environments and orchestrate actions to reduce cyber and operational risk. Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device, as well as continuous posture assessment. As of December 31, 2019, more than 3,700 customers in over 90 countries rely on Forescout’s infrastructure-agnostic solution to reduce the risk of business disruption from security incidents or breaches, ensure and demonstrate security compliance and increase security operations productivity. Learn how at www.forescout.com

Products

  • eyeSight

    Complete device visibility. Continuously discover, classify and assess devices without agents or active techniques that could compromise business operations. Read Datasheet.

  • eyeSegment

    Transforming Enterprise. Wide Network Segmentation - Accelerate the design, planning and deployment of dynamic network segmentation across the extended enterprise to reduce your attack surface and regulatory risk. Download Datasheet.

  • eyeControl

    Enforce and automate policy-based controls. Take action to mitigate threats, incidents and compliance gaps. Download What’s New!

  • eyeExtend

    Extend the value of your security and IT investments. eyeExtend products share device context between the Forescout platform and other IT and security products to automate policy enforcement across disparate solutions and accelerate system-wide response to mitigate risks.

  • eyeManage

    Centralized configuration, management and monitoring. Gain a single-pane-of-glass view for every network-connected device. Unify asset, compliance and risk reporting across the extended enterprise. Download Datasheet.

  • eyeRecover

    Service continuity and resiliency for single- or multi-site deployments.

  • Forescout Extended Modules

    Forescout Extended Modules extend the capabilities of CounterACT to a vast range of system infrastructure and third-party security management tools. Orchestrate more.

Demo Desk


Join our Forescout Demo Jock for a brief overview on how Forescout can agentlessly provide over 150 characteristics about every IP Connected Device on your network - BYODs, IOTs, and OTs included - and then use that information for dynamic network segmentation. This Demo Desk will display how Forescout helps every team automate threat response, maintain compliance, and get information about every asset on their network in real time, even as those devices change.

Join us for upcoming sessions!

Test Drive

Test Drive Tuesday

Experience Forescout 8.2—virtually

In these challenging times, in-person demos are out of the question, but we have a solution: the Forescout Virtual Test Drive. It’s a hands-on, condensed tour of Forescout 8.2 that highlights the latest platform updates—including Forescout eyeSegment capabilities. In just 90 minutes on the Tuesday morning or afternoon of your choice, you’ll take four laps covering device visibility, asset management, incident response, and network segmentation. Learn how to quickly identify high-risk devices and act—faster.

Experience the Forescout before-and-after difference—the difference that lets you dramatically mitigate risk across your extended enterprise and protect your organization. Put the Forescout platform through its paces. Register now and select the date and time that works best for you.

 

 

Upcoming Dates - Register Here

  • May 19
  • May 26
  • June 2
  • June 9
  • June 16

Past Dates

  • January 9 | 11:30am | Sacramento, CA

If you have any questions about an event that has passed, please feel free to reach out to Forescout@carahsoft.com

Blogs

How to Jumpstart Your NIST Cybersecurity Framework Maturity: Recover Function

April 8, 2020

In this final post of our series, we’ll discuss the fifth Function of the NIST Cybersecurity Framework, Recover. This Function requires organizations to develop and implement activities to restore capabilities or services that were impaired due to a cybersecurity event. To comply, organizations need to put a recovery plan into place to get back to their last “known good” state, be able to coordinate restoration activities with external parties and incorporate lessons learned into an updated recovery strategy. Learn More...

Inability to Account for Networked Assets Will Hinder Defense Contractors’ Achievement of CMMC

April 6, 2020

Forescout is actively engaged with the defense contractor community to implement Cybersecurity Maturity Model Certification (CMMC) controls. Forescout’s core capabilities that are of particular interest to defense contractors considering the CMMC include: identifying and assessing devices on networks, controlling access to and within the network and addressing many found vulnerabilities—whether by directly remediating, initiating remediation actions or quarantining devices. In Forescout’s experience, most defense contractors lack awareness of approximately fifty percent of the connected devices on their networks before they deploy the Forescout platform. Learn More...

5 Questions for It Professionals to Adapt to Today’s Remote Working Environment

March 24, 2020

We are in unprecedented times, navigating a new reality where business is largely being conducted remotely, outside of a secure office network. As strange as it feels to many, it’s something I’ve been preparing for over 10 years. In 2009, I was part of a team that built the UK Pandemic Flu service designed to provide clinical evaluations for a vaccine in the event of an outbreak. My team worked alongside the UK Chief Medical Officer to better understand how to create a resilient IT service and support function to operate during a pandemic outbreak. Today, it feels surreal that many of those theoretical implications are now coming true. Learn More...

Keeping Our Forescout Family Secure During COVID-19

March 19, 2020

While we’re restricting travel and working remotely, we want to help you with your security needs so you can stay focused on what is most important – the health and safety of your teams, family and friends. Whether it is to secure your remote access program, ensure onsite and offsite device hygiene, or automate tasks due to reduced IT capacity, we’re here to support our customer and partner community. Learn More...

Embracing Zero Trust for IOT and OT: A Fundamental Mind Shift

March 18, 2020

Securing any network begins with understanding every connected user and device and every bit of data they are trying to access. This is a basic premise of any security framework—including Zero Trust. Clearly, you need to know who is trying to access what before you can create appropriate enforcement policies and controls. Learn More...

A Healthy Hospital Is Founded on 5 Key Cyber Principles

March 5, 2020

Today, running a healthy hospital means much more than curing diseases and fixing broken bones. It also means making sure the underlying technology is strong and secure enough to support those operations. Hospitals, clinics, and other healthcare organizations are adding more connected devices to their networks than ever before. These devices add significant benefits, like the increased ability to monitor patients with real-time results from medical scans. Learn More...

COVID-19 Should Prompt Enterprises to Move Quickly to Zero Trust

COVID-19 makes organizations confront the reality that their network boundaries no longer end with their own infrastructure but now extend to employees’ homes. Underscoring this is the Office of Management and Budget’s request that federal agencies “offer maximum telework flexibilities to all current telework eligible employees, consistent with operational needs of the departments and agencies.” To maintain continuity of operations, government organizations must move toward a new network security paradigm that distrusts all devices and users and denies them access to network resources until they have demonstrated the requisite level of security and authorization. That strategic initiative is called “zero trust.” Learn More...

Count on Carahsoft

Forescout is an enterprise device visibility platform that agentlessly ensures compliance and proper network segmentation for all IPs within the network. The platform provides 100% visibility out of the box and with that information can then ensure all behavior is normal or within limits across the network. This works across VPNs, traditional IT devices, IoTs, BYODs, and OTs. With control actions, the platform can then do agentless network access control and complete device traffic management.

For more information on discounts and special contract terms, please contact the Forescout team at Forescout@carahsoft.com or call 1-833-372-8468.

Resources:

C2C


Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ForeScout ESI BPA Contract #N66001-18-A-0005

N66001-18-A-0005
Dec 21, 2017- Dec 20, 2022

State and Local

Educational Software Solutions and Services - OMNIA Partners, Public Sector

R191902
Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022

Events

Archived Events

News

Latest News

Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S. Department of Defense (DoD) to expand cybersecurity across its global enterprise ...
READ MORE >
Forescout Technologies, Inc. (NASDAQ:FSCT), the leader in device visibility and control, today announced a strategic partnership with Medigate, a dedicated medical device security and asset management ...
READ MORE >
By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.
READ MORE >
The recently passed National Defense Authorization Act requires the Department of Defense to compare the capabilities of its Comply-to-Connect initiative (C2C) to those that the Department of Homeland ...
READ MORE >
ForeScout Technologies (NASDAQ: FSCT), a leading Internet of Things (IoT) security company, today announced new foundational innovations in ForeScout CounterACT® 8 that raise the bar on device ...
READ MORE >
Defense Information Systems Agency publishes influential STIG validation for ForeScout, documenting its proven technology to provide visibility and control of evolving, IoT-driven systems
READ MORE >
ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, today announced that the U.S. Department of Defense (DoD) awarded the company and its federal partners an ...
READ MORE >

Resources

Resources

Comply-to-Connect (C2C) is a comprehensive cybersecurity framework of tools and technologies designed to increase cybersecurity efficiency across The Department of Defense’s (DoD) current and emerging operational environments. The Forescout platform can provide visibility, hygiene, mitigation and ...

What is a Command Cyber Readiness Inspection (CCRI)? A CCRI is a comprehensive review of a Department of Defense (DoD) entity’s cybersecurity posture that includes a detailed assessment of its Information Assurance programs, the non-classified and classified IP networks, and the critical cyber and...

Keeping up with IP assets today seems like an almost impossible task. View this one-pager for information on how Forescout & ServiceNow have teamed up to enhance network security and visibility.

Forescout Technologies, Inc., the leader in Enterprise of Things security, today announced it was selected by the U.S. Department of Defense (DoD) to expand cybersecurity across its global enterprise as the initial phase of a multi-million dollar contract award through 2020.

ForeScout CounterACT® version 8.0 delivers new capabilities that significantly enhance deployment, authentication, visibility, detection, classification, control and security.

Register here to join Forescout’s Customer Portal

Solutions Brief

Use continuous asset visibility to unify cyber and operation risk management across IT and OT environments with Forescout SilentDefense.

Safely securing healthcare organizations with continuous device insight and automated policy enforcement

Every day, government agencies process vast amounts of sensitive information vital to U.S. national security. Loss of this sensitive data or unauthorized access to the systems and networks it resides on can have serious national security consequences, ranging from privacy issues and public embarrass...

Make Your Risk Management Framework a Reality with CounterACT