Internet of Things

CounterACT helps government IT professionals and those with government contracts to detect, monitor and securely manage devices, including the growing numbers of IoT devices. Learn more


CounterACT offers the unique ability to:

  • See IoT devices the instant they connect to government networks, without requiring software agents or prior device knowledge
  • Allow, deny or limit network access based on device posture or agency security policies
  • Share contextual insights, automate workflows and accelerate system-wide response by integrating with third-party security tools through ForeScout Extended Modules

NISTRMF (Risk Management Framework)

ForeScout CounterACT helps you proactively enforce a unified network security policy to address National Institute for Standards and Technology (NIST) RMF requirements in three key ways:

  • See – Detect IP-addressed endpoints on the network, including unmanaged, IoT and rogue devices, without requiring software agents or previous device knowledge.
  • Control – Allow, deny or limit network access based on device posture and security policies. Automate security and compliance policy enforcement and reduce the time to identify and resolve incidents while allowing security operations to be more efficient, effective and proactive.
  • Orchestrate – Share real-time security intelligence across more than 70 network, security, mobility and IT management products* to automate and accelerate system wide threat response while reducing the risk and costs associated with manual analysis and correlation.

Learn more

Continuous Diagnostics and Mitigation

CounterACT can serve as the centerpiece of your CDM solution to help your agency gain real-time asset discovery, vulnerability management and intelligent response to address compliance management. Learn more


CounterACT helps you:

  • Continuously discover and classify unauthorized or unmanaged hardware and software on your network
  • Provide real-time endpoint visibility for vulnerability assessment, asset and configuration management solutions
  • Assess the security posture of endpoints on your LAN/WAN environment
  • Improve authentication and access control by blocking/restricting access to unauthorized or noncompliant

Command Cyber Readiness Inspections

ForeScout offers a policy-based security platform for endpoint compliance automation that can help DoD IT organizations create, monitor and enforce endpoint security policies in accordance with DISA STIGs and CJCSI directives with minimal effort. CounterACT identifies devices that are noncompliant with HBSS or ACAS even when those devices are entirely unknown. Learn more


CounterACT automates endpoint compliance controls through:

  • Visibility and asset management
  • Authentication and access control
  • Compliance monitoring and remediation
  • Compliance notification and reporting