Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 1 Rating

Total
ease
features
design
support

Description

Forescout serves as an all-encompassing cybersecurity solution that delivers real-time insights, control, and automation to effectively manage risks associated with various devices and networks. The platform equips organizations with the tools needed to observe and safeguard a wide spectrum of IT, IoT, and operational technology (OT) assets, ensuring they remain well-protected against cyber threats. By implementing Forescout's Zero Trust approach alongside its integrated threat detection features, companies can enforce compliance for devices, manage secure access to networks, and maintain ongoing monitoring to identify vulnerabilities. Tailored for scalability, Forescout’s platform furnishes valuable insights that enable organizations to reduce risks and boost their security stance across multiple sectors, including healthcare, manufacturing, and beyond. The comprehensive nature of Forescout's offerings ensures that businesses are better prepared to navigate the evolving landscape of cyber threats.

Description

SonicWall Capture Client serves as an integrated platform that provides a range of endpoint protection features, such as advanced malware defense and insights into application vulnerabilities. It utilizes cloud-based sandbox testing for files, extensive reporting capabilities, and enforcement mechanisms to ensure robust endpoint security. Furthermore, it offers reliable guarantees regarding client safety, along with user-friendly and actionable intelligence and reporting tools. The platform inspects files that may be poised for activation within a cloud sandbox environment. It employs dynamic white and blacklisting techniques alongside cloud intelligence to enhance security measures. Advanced static analysis is used to detect threats during the download process, and shared threat intelligence from SonicWall’s verdict database is leveraged for improved defense. Users can visualize threat maps to trace the origins and destinations of threats, enabling a clearer understanding of their security landscape. Additionally, the system allows for cataloging applications to identify any potential vulnerabilities they may have, ensuring that users maintain a comprehensive view of their security posture and can take necessary action on any risks identified.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AT&T Alien Labs Open Threat Exchange
AuthControl Sentry
Axonius
BackBox
Carbon Black EDR
Check Point IPS
Check Point Infinity
Cylera Platform
Cynerio
Google Digital Risk Protection
Mandiant Managed Defense
Nexpose
NorthStar Navigator
Phosphorus
Rapid7 InsightConnect
Sepio
TYCHON
Vectra AI
appNovi
iTalent

Integrations

AT&T Alien Labs Open Threat Exchange
AuthControl Sentry
Axonius
BackBox
Carbon Black EDR
Check Point IPS
Check Point Infinity
Cylera Platform
Cynerio
Google Digital Risk Protection
Mandiant Managed Defense
Nexpose
NorthStar Navigator
Phosphorus
Rapid7 InsightConnect
Sepio
TYCHON
Vectra AI
appNovi
iTalent

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Forescout Technologies

Founded

2000

Country

United States

Website

www.forescout.com

Vendor Details

Company Name

SonicWall

Founded

1991

Country

United States

Website

www.sonicwall.com/products/firewalls/security-services/capture-client/

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Auconet BICS Reviews

Auconet BICS

Auconet

Alternatives

SanerNow Reviews

SanerNow

SecPod Technologies
Armis Reviews

Armis

Armis Security