02:28 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

ForeScout Offers Network Access Control Competitive Trade-In

Customers of Cisco, Juniper, Bradford, Symantec, and other NAC products can move up to ForeScout at an attractive discount

Cupertino, Calif. — June 29, 2011 — In conjunction with the recent report “The Forrester Wave™: Network Access Control, Q2 2011,” which ranked ForeScout Technologies the top rated performer in both strength of current product offering and strategy, ForeScout invites IT organizations to trade in their current NAC product and take advantage of ForeScout’s award-winning CounterACT Virtual Appliance at an attractive discount. With ForeScout network access control (NAC), organizations can realize the productivity and connectivity benefits of anytime, anywhere, any means access while automating visibility and control over who, how, when and what devices are connecting to their enterprise.

From now through September 26, 2011, customers of Cisco, Juniper, Bradford, Symantec and other NAC products can move up to ForeScout at an attractive discount. This offer applies to end user’s licensed active NAC products under maintenance – other terms and conditions apply. Resellers and systems integrators are encouraged to offer their customers the means to “go green and save green.” For more details, visit www.forescout.com.

“ForeScout is the market leader as proven by our enterprise-class functionality and by the unprecedented number of competitive wins in commercial, government and education accounts,” said Brant Kennedy, vice president of worldwide sales at ForeScout. “We have demonstrated that we are customer-driven and this competitive trade-in offer will give IT/security decision makers exactly what they are asking for – the market leading solution with virtual appliance flexibility at a compelling value.”

ForeScout CounterACT delivers unparalleled usability, flexibility, integration, interoperability and scale. Since the solution identifies all devices accessing the network, including mobile and personal devices, it assesses security posture assessment, performs endpoint compliance and remediation, and monitors for post-network admission threats by uniformly applying security policies across diverse network and security infrastructures – dynamically and without requiring agents.

The virtual appliance allows customers to take advantage of rapid provisioning, flexible implementation and on-demand capacity leveraging their VMware investment. CounterACT physical and virtual appliances perform identically and can operate together, centrally controlled by ForeScout CounterACT Enterprise Manager, which is also available as a virtual appliance, to manage over 250,000 devices from one console. At any point under maintenance, CounterACT virtual appliance customers can increase capacity on-demand by applying more resources or VMs with ForeScout’s investment protection license upgrade program.

About ForeScout Technologies, Inc. ForeScout enables its customers to unleash the full power of their network through enterprise-class security and control. ForeScout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because ForeScout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web