02:28 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

ForeScout Offers Network Access Control Competitive Trade-In

Customers of Cisco, Juniper, Bradford, Symantec, and other NAC products can move up to ForeScout at an attractive discount

Cupertino, Calif. — June 29, 2011 — In conjunction with the recent report “The Forrester Wave™: Network Access Control, Q2 2011,” which ranked ForeScout Technologies the top rated performer in both strength of current product offering and strategy, ForeScout invites IT organizations to trade in their current NAC product and take advantage of ForeScout’s award-winning CounterACT Virtual Appliance at an attractive discount. With ForeScout network access control (NAC), organizations can realize the productivity and connectivity benefits of anytime, anywhere, any means access while automating visibility and control over who, how, when and what devices are connecting to their enterprise.

From now through September 26, 2011, customers of Cisco, Juniper, Bradford, Symantec and other NAC products can move up to ForeScout at an attractive discount. This offer applies to end user’s licensed active NAC products under maintenance – other terms and conditions apply. Resellers and systems integrators are encouraged to offer their customers the means to “go green and save green.” For more details, visit www.forescout.com.

“ForeScout is the market leader as proven by our enterprise-class functionality and by the unprecedented number of competitive wins in commercial, government and education accounts,” said Brant Kennedy, vice president of worldwide sales at ForeScout. “We have demonstrated that we are customer-driven and this competitive trade-in offer will give IT/security decision makers exactly what they are asking for – the market leading solution with virtual appliance flexibility at a compelling value.”

ForeScout CounterACT delivers unparalleled usability, flexibility, integration, interoperability and scale. Since the solution identifies all devices accessing the network, including mobile and personal devices, it assesses security posture assessment, performs endpoint compliance and remediation, and monitors for post-network admission threats by uniformly applying security policies across diverse network and security infrastructures – dynamically and without requiring agents.

The virtual appliance allows customers to take advantage of rapid provisioning, flexible implementation and on-demand capacity leveraging their VMware investment. CounterACT physical and virtual appliances perform identically and can operate together, centrally controlled by ForeScout CounterACT Enterprise Manager, which is also available as a virtual appliance, to manage over 250,000 devices from one console. At any point under maintenance, CounterACT virtual appliance customers can increase capacity on-demand by applying more resources or VMs with ForeScout’s investment protection license upgrade program.

About ForeScout Technologies, Inc. ForeScout enables its customers to unleash the full power of their network through enterprise-class security and control. ForeScout’s automated solutions for network access control, mobile security, threat prevention and endpoint compliance empower organizations to gain access agility while preempting risks and eliminating remediation costs. Because ForeScout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries. Headquartered in Cupertino, California, ForeScout delivers its solutions through its network of authorized partners worldwide. Learn more at www.forescout.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) dol_use_jmobile, (2) dol_optimize_smallscreen, (3) dol_no_mouse_hover, (4) dol_hide_topmenu, (5) dol_hide_leftmenu, (6) mainmenu, or (7) leftmenu pa...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.