Forescout Technologies is transforming security through visibility, providing agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. See devices. Control them. Orchestrate multivendor response. Learn how at





CounterACT® discovers and classifies devices without requiring agents. Based on its classification, CounterACT then assesses the device’s security posture and applies policies that enforce the specific behavior the device is allowed to have while connected to a network. Learn more


CounterACT Enterprise Manager provides centralized management and control of distributed virtual and physical CounterACT appliances. Enterprise Manager serves as a single pane of glass for every device connected to the network that is managed by a CounterACT appliance at any given time. It is also used to define and manage the device policies. Enterprise Manager scales to support CounterACT deployments in networks exceeding one million devices.


Forescout orchestrates system-wide security management to make formerly disjointed security products work as one. This unique set of network, security and management interoperability technologies extends the power of Forescout CounterACT® to more than 70 third-party solutions (as of September 30, 2016), allowing the combined system to accelerate response, achieve major operational efficiencies and provide superior security.


The ControlFabric® Architecture is a set of open integration technologies that enables Forescout CounterACT® and other IT solutions to exchange information and more efficiently mitigate a wide variety of network, security and operational issues. As a result, customers can achieve continuous monitoring and mitigation capabilities that better leverage their infrastructure investments and optimize IT resources. Learn more

Internet of Things

CounterACT helps government IT professionals and those with government contracts to detect, monitor and securely manage devices, including the growing numbers of IoT devices.

CounterACT offers the unique ability to:

  • See IoT devices the instant they connect to government networks, without requiring software agents or prior device knowledge
  • Allow, deny or limit network access based on device posture or agency security policies
  • Share contextual insights, automate workflows and accelerate system-wide response by integrating with third-party security tools through Forescout Extended Modules

NISTRMF (Risk Management Framework)

Forescout CounterACT helps you proactively enforce a unified network security policy to address National Institute for Standards and Technology (NIST) RMF requirements in three key ways:

  • See – Detect IP-addressed endpoints on the network, including unmanaged, IoT and rogue devices, without requiring software agents or previous device knowledge.
  • Control – Allow, deny or limit network access based on device posture and security policies. Automate security and compliance policy enforcement and reduce the time to identify and resolve incidents while allowing security operations to be more efficient, effective and proactive.
  • Orchestrate – Share real-time security intelligence across more than 70 network, security, mobility and IT management products* to automate and accelerate system wide threat response while reducing the risk and costs associated with manual analysis and correlation.

Learn more

Continuous Diagnostics and Mitigation

CounterACT can serve as the centerpiece of your CDM solution to help your agency gain real-time asset discovery, vulnerability management and intelligent response to address compliance management. Learn more

CounterACT helps you:

  • Continuously discover and classify unauthorized or unmanaged hardware and software on your network
  • Provide real-time endpoint visibility for vulnerability assessment, asset and configuration management solutions
  • Assess the security posture of endpoints on your LAN/WAN environment
  • Improve authentication and access control by blocking/restricting access to unauthorized or noncompliant

Command Cyber Readiness Inspections

Forescout offers a policy-based security platform for endpoint compliance automation that can help DoD IT organizations create, monitor and enforce endpoint security policies in accordance with DISA STIGs and CJCSI directives with minimal effort. CounterACT identifies devices that are noncompliant with HBSS or ACAS even when those devices are entirely unknown. Learn more

CounterACT automates endpoint compliance controls through:

  • Visibility and asset management
  • Authentication and access control
  • Compliance monitoring and remediation
  • Compliance notification and reporting

Forescout Contracts

Contract Name sort descending Contract Number Sector State
CIO-CS HHSN316201500012W
  • Federal
Department of Defense Forescout ESI BPA N66001-18-A-0002
  • Federal
GSA IT Schedule 70 GS-35F-267DA
  • Federal
  • State
National Cooperative Purchasing Alliance (NCPA) - Systems and Information Management Software 01-74 / 01-81 / 01-87
  • State
SEWP V Group A: NNG15SC07B; Group D: NNG15SC98B
  • Federal
State of California Multiple Award Schedule (CMAS) 3-16-70-1047B
  • State
State of Maryland Multi-Vendor COTS IDIQ 06B02490021
  • State
TIPS 180503
  • State