{"id":76191,"date":"2023-02-03T13:20:36","date_gmt":"2023-02-03T21:20:36","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/solutions\/multifactor-risk-scoring-copy\/"},"modified":"2025-06-10T09:36:14","modified_gmt":"2025-06-10T13:36:14","slug":"eyealert","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/products\/eyealert\/","title":{"rendered":"eyeAlert"},"content":{"rendered":"<h1>eyeAlert<\/h1>\n<p>Security operations center (SOC) teams face a daily barrage of incomplete and inaccurate alerts that lack vital contextual information, many of them false positives. As a result, analysts miss critical threats and take longer to investigate and respond to them, increasing the risk of a breach.<\/p>\n<p>See it in actionread the solution brief<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/XDR-infographic_450_1.png\" alt=\"XDR Infographic: Improve Alert Efficiency\" loading=\"lazy\"><\/p>\n<p><a href=\"\/xdr-demo-request\" title=\"See it in Action\" class=\"c-btn c-btn--primary\">See it in Action<\/a><\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">R4IoT: eyeAlert Automatically Detects and Responds<\/h2>\n<p>R4IoT is a proof-of-concept ransomware created by Forescout Vedere Labs that exploits an IoT device to gain access and move laterally in an IT network before impacting the OT network. Siloed security tools cannot fully detect cross-device threats like this. See how eyeAlert automatically detects and responds to R4IoT.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/XDR-benefits.png\" class=\"o-ornament-block__img\" alt=\"XDR - Extended Threat Detection and Response\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title\">Business Value<\/h2>\n<p><strong>eyeAlert is an extended detection and response solution that converts telemetry and logs into high fidelity, SOC-actionable probable threats.<\/strong><\/p>\n<p>It automates the detection, investigation, hunt for and response to advanced threats across all connected assets \u2013 IT, OT\/ICS, IoT and IoMT \u2013 from campus to cloud to data center to edge. eyeAlert combines essential SOC technologies and functions into a unified, cloud-native platform, viewable and actionable from a single console.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Reduce business risk\u200b<\/h3>\n<p>Reduce the risk and magnitude of a successful attack, business disruption or data breach by eliminating alert noise so you can quickly and accurately detect, investigate and respond to the broadest range of advanced threats.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Lower costs\u200b<\/h3>\n<p>Consolidate point solutions (data lake, security analytics, SOAR, UEBA, threat intel platform) and reduce costs related to data onboarding, rules management and analyst turnover with a solution that simplifies and supports their workflow.\u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Optimize security operations\u200b<\/h3>\n<p>Streamline the analyst function and speed complex investigation and threat-hunting processes with enriched, normalized and contextualized data correlated to produce a small number of  detections that warrant investigation \u2013 all in a unified console that integrates with case management systems and other security tools.\u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Leverage multi-vendor security investments\u200b<\/h3>\n<p>Derive more value from existing solutions and make better use of asset data and threat intel via automation across case management and incident response systems, sensors (network, endpoint, cloud) and enforcement points. \u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Support compliance\u200b<\/h3>\n<p>Combine long-term log storage with automated threat detection and threat intelligence to close the potential gap between when a breach or disruption is noticed and when a response action is taken.\u200b<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/eyealert-solution-brief\/\" title=\"Read the Solution Brief\" class=\"c-btn c-btn--primary\" target=\"_blank\">Read the Solution Brief<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/aimbridge-quote.jpg\" class=\"u-size-full\" alt=\"Aimbridge Hospitality Quote\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">eyeAlert Customer Confidence<\/h2>\n<p>\u201cForescout, delivered as a managed service, is a strategic part of our layered defense strategy. It combines essential storage of raw telemetry, in support of compliance mandates, with advanced threat detection and response capabilities to further reduce risk and help us meet cyber insurance requirements. Its ability to automatically and reliably identify true threats from a broad range of data sources across our highly distributed and global IT environment, and to present these with detailed contextual information that streamlines the investigation and response process, is both impressive, and essential in today\u2019s threat environment.\u201d<\/p>\n<p>\u0097 Andrew Arthurs, CIO, Aimbridge Hospitality<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Preview the Solution<\/h2>\n<p>Watch CTO Justin Foster run through key features in eyeAlert.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/company\/contact-us\" title=\"talk to an expert\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-pulse\">talk to an expert<\/a><\/p>\n<h2 class=\"c-title\">1 Detection per Hour, from 50 Million Logs <\/h2>\n<p>eyeAlert combines vendor- and EDR-agnostic support for more than 180 data sources in our cloud-based data lake, with cost-effective log retention and management, automated data normalization and enrichment, and a two-stage threat detection engine to weed out false positives and identify true threats, along with more than 1,500 verified detection rules and models that are regularly updated.\u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/XDR-infographic_funnel.png\" alt=\"Diagram showing how Forescout XDR addresses alert fatigue by reducing the number of SOC-actionable detections per hour from 450 to 1.\" loading=\"lazy\"><\/p>\n<p><a href=\"\/xdr-demo-request\/\" title=\"Talk to an Expert\" class=\"c-btn c-btn--primary icon-position-right has-icon-animation icon-animation-pulse\" target=\"_blank\">Talk to an Expert<\/a><\/p>\n<h2 class=\"c-title\">eyeAlert combines essential SOC technologies and functions into a single, unified, cloud-native console. \u200b<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Data-Support.png\" alt=\"Data Ingestion\" loading=\"lazy\"><\/p>\n<h3>Data ingestion<\/h3>\n<p>Natively supports Forescout eyeSight, eyeInspect and Medical Device Security data \u2013 and over 180 vendor- and EDR-agnostic sources including:<br \/>\nsecurity, infrastructure, enrichment, applications and cloud\/SaaS\n\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Security: <\/strong>Firewall, network IDS\/IPS, EDR, EPP, server\/workload\/container<br \/>\nsecurity, web proxy and email security<\/li>\n<li><strong>Infrastructure:<\/strong> Windows security, AD authentication, IAM, DHCP, DNS, cloud audit trail and network metadata<\/li>\n<li><strong>Enrichment:<\/strong> Identity (LDAP), asset inventory and classification, configuration management, vulnerability scan results, IOCs<\/li>\n<li><strong>Applications:<\/strong> Database, ERP, CRM and APIs<\/li>\n<li><strong>Cloud\/SaaS:<\/strong> AWS, Microsoft Azure, Google Cloud, Microsoft 365, Google Workspace and any other SaaS application<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Data-Onboarding.png\" alt=\"XDR Data Onboarding\" loading=\"lazy\"><\/p>\n<h3>Data onboarding<\/h3>\n<p>Helps ensure that you extract maximum detection value to support your most important use cases. Forescout data engineers work alongside your team to plan and prioritize the data sources to be onboarded, then help configure the data pipeline and ensure your data is being properly parsed, cleansed, normalized and enriched. \u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Data-Pipeline.png\" alt=\"XDR Advanced Data Pipeline\" loading=\"lazy\"><\/p>\n<h3>Advanced data pipeline<\/h3>\n<p>Applies a rigorous data science-centric approach to manage data flowing from enterprise-wide sources into thethreat detection engine.<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Enforces a common information model (CIM) to normalize ingested data.<\/li>\n<li>Enriches data with IP address, geolocation, ADObject properties, configuration and other contextual data to maximizes detection and enable faster correlations across data sources.<\/li>\n<li>Uses an ETL (extract-transform-load) process for faster, stabler, more efficient data analysis than more common ELT (extract-load-transform) processes.<\/li>\n<\/ul>\n<p><a href=\"\/xdr-demo-request\/\" title=\"See it in Action\" class=\"c-btn c-btn--primary icon-position-right has-icon-animation icon-animation-pulse\">See it in Action<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/XDR-MITRE-Zoom.jpg\" class=\"u-size-full\" alt=\"XDR MITRE Zoom\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">MITRE ATT&amp;CK framework integration<\/h2>\n<p>Allows you to instantly see how different data sources map to the tactics, techniques and procedures (TTPs) of the <a href=\"\/glossary\/what-is-the-mitre-attack-framework\/\">MITRE ATT&amp;CK framework<\/a>. This makes it easy to prioritize the initial data sources that should be ingested for broad or specific TTP coverage, to identify potential blind spots that adversaries can exploit and to determine which additional data sources would further elevate your coverage. <\/p>\n<p><a href=\"\/xdr-demo-request\/\" title=\"See It In Action\" class=\"c-btn c-btn--primary icon-position-right has-icon-animation icon-animation-fade-in\">See It In Action<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Data-Lake.png\" alt=\"Cloud Based Data Lake\" loading=\"lazy\"><\/p>\n<h5>Cloud-based data lake<\/h5>\n<p>Massively scalable, purpose-built, indexed data lake with tiered data storage (hot, warm, cold) and rapid, full-text search. This provides cost-effective short-term and optional longer-term (7 days to 1 year+) log retention and management of either raw telemetry or enriched data, in support of security and compliance requirements.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/UEBA.png\" alt=\"UBEA XDR\" loading=\"lazy\"><\/p>\n<h5>Threat detection engine<\/h5>\n<p>Two-stage threat detection engine applies five detection techniques to automatically generate high-fidelity, high-confidence true threats that warrant investigation, while weeding out false positives.<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Cyber intel: <\/strong>More than 70 sources to look for backdoors, command-and-control traffic or phishing.<\/li>\n<li><strong>Signatures:<\/strong> Match object attributes to a known bad object to identify threats inside raw telemetry, uncleanable malware, ransomware, etc.<\/li>\n<li><strong>UEBA:<\/strong> Looks for abnormal behaviors that match a digital pattern, footprint, human activity or network behavior with known bad behavior.<\/li>\n<li><strong>Statistics and outliers:<\/strong> Uses clustering, grouping, stack counting, baseline and variation, outlier detection, logistic regression and other methods to detect anomalous activity.<\/li>\n<li><strong>Algorithms:<\/strong> Uses context-aware AI and ML techniques such as supervised\/unsupervised learning or deep learning to detect malicious or anomalous<br \/>\nactivity and predict attacks.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Detection-Rules.png\" alt=\"XDR Detection Rules\" loading=\"lazy\"><\/p>\n<h5>Detection rules<\/h5>\n<p>Includes more than 1,500 verified, out-of-the box detection rules and models for your data sources. These rules have been tested on production data to ensure they operate effectively and deliver value on Day One. Custom detection rules give you the power and flexibility to quickly create indicator, detection and health rules that address your unique requirements, with a guided user experience. \u200b<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/eyealert-solution-brief\/\" title=\"Read the Solution Brief\" class=\"c-btn c-btn--primary\" target=\"_blank\">Read the Solution Brief<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/XDR-infographic_threat-intel-diagram-1.png\" class=\"u-size-full\" alt=\"XDR Infographic Threat Intel Diagram\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Threat intelligence<\/h2>\n<h3>&gt;70 Global sources and classified, corroborated and scored<\/h3>\n<p>eyeAlert references IOCs from over 70 high-quality sources worldwide, including from Vedere Labs, Forescout\u2019s team of global research experts. These IOCs are classified, corroborated and scored to provide finished intelligence that is automatically leveraged across the threat detection, hunting and investigation process. You have access to detailed threat reports from Forescout researchers that profile key threat actors and threats. Anonymized IOC data can also be shared among opt-in community members, including industry-specific ISACs, via a built-in community threat exchange.<\/p>\n<ol>\n<li>IOC data from a broad range of reliable sources<\/li>\n<li>IOC intel correlated into a searchable database of \u201cknown bad\u201d domains, URLs and IPv4 and IPv6 addresses<\/li>\n<li>Each IOC dynamically assigned a confidence score based on source quality<\/li>\n<li>Confidence-scored IOC intel leveraged by threat detection engine and customer SOC teams to accelerate threat detection and investigation<\/li>\n<\/ol>\n<p><a href=\"\/xdr-demo-request\/\" title=\"See It In Action\" class=\"c-btn c-btn--primary\">See It In Action<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/UEBA.png\" alt=\"UBEA XDR\" loading=\"lazy\"><\/p>\n<h3>UEBA<\/h3>\n<p>Behavior-based analytics are used to detect significant changes to behavior or anomalous activity for an entity. Standard profiles and behaviors are built for users and hosts across time, and any activity that is anomalous to these standard baselines is triggered as suspicious.\u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/SOAR.png\" alt=\"SOAR\" loading=\"lazy\"><\/p>\n<h3>SOAR<\/h3>\n<p>Orchestrates the SOC process from detection through investigation and response with built-in case management and notifications.<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong>Automates security<\/strong> through enrichment sources such as IP geolocation, user and asset information, and correlation to multiple intelligence<br \/>\nsources.<\/li>\n<li>Leverages Forescout eyeSight and eyeControl for automated orchestration<br \/>\nand response workflows across all managed and unmanaged devices.<\/li>\n<li>If desired, continue to leverage your existing SOAR through integration<br \/>\nwith Palo Alto Cortex XSOAR and other SOARs.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/Case-Mgmt.png\" alt=\"XDR Case Management\" loading=\"lazy\"><\/p>\n<h3>Case management<\/h3>\n<p>Provides workflows, tight integration, transparency and seamless communication and collaboration during detection handling and incident management.<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li>Based on the NIST Incident Response Life Cycle, eyeAlert supports integrations with ServiceNow, RSA Archer, Jira Software, ManageEngine ServiceDesk Plus, Palo Alto Cortex XSOAR, TheHive and ConnectWise.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/eyealert-solution-brief\/\" title=\"Read the Solution Brief\" class=\"c-btn c-btn--gray\" target=\"_blank\">Read the Solution Brief<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/xdr-screenshot.jpg\" class=\"u-size-full\" alt=\"Forescout XDR Improves SOC Efficiency: Product Screenshot\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Dashboards &amp; Reports<\/h2>\n<p>Preconfigured and customizable persona-based dashboards provide KPIs relevant to a variety of roles, including analysts\/IR, engineers, SOC manager, compliance and risk managers, and executives. Proactive dissemination and sharing of reports and\/or metric delivers insight into the hands of those responsible for manageing SOC operations as well as exectutive team members.<\/p>\n<p><a href=\"\/xdr-demo-request\/\" title=\"See It In Action\" class=\"c-btn c-btn--primary\">See It In Action<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/03\/FS-2022-Platform-Launch-Web-Icons-v1-devicecloud.png\" alt=\"Forescout Platform Device Cloud\" loading=\"lazy\"><\/p>\n<h3>Cloud-native<\/h3>\n<p>Nothing to deploy, with new features, fixes and rules delivered seamlessly and bi-weekly<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li><strong> Ease of management<\/strong><\/li>\n<li><strong> Faster release cycle and updates<\/strong><\/li>\n<li><strong> Reliability and security<\/strong><\/li>\n<li><strong> Cost effectiveness<\/strong><\/li>\n<li><strong> Hyper-scale<\/strong><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/multi-tenant.png\" alt=\"XDR Multi-tenant Logical Separations\" loading=\"lazy\"><\/p>\n<h3>Multi-tenant<\/h3>\n<p>Logical separations (or tenants) easily created based on country, office location or business unit, for example. You can also generate aggregate views and perform queries and analyses across tenants and business units, right up to the global level. \u200b<br \/>\nParticularly beneficial for large enterprises, multinationals, MSSPs and organizations with regional SOCs.\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/global-architecture.png\" alt=\"Unified global architecture\" loading=\"lazy\"><\/p>\n<h3>Unified global architecture<\/h3>\n<p>Data residency and compliance requirements readily met, with cost-effective support for regional security operations. Specify where you want your logs to be stored among 25 regions across the Americas, Europe and Asia-Pacific \u2013 while still being able to view and query your data globally.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/siem.png\" alt=\"SIEM XDR\" loading=\"lazy\"><\/p>\n<h5>SIEM Integration<\/h5>\n<p>True threats identified by eyeAlert can be fed to an existing SIEM for centralized orchestration and incident response. \u200b<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/02\/continuous-software.png\" alt=\"Forescout XDR includes continuous software and content updates\" loading=\"lazy\"><\/p>\n<h5>Continuous software and content updates<\/h5>\n<p>New features, functionality and fixes, along with new detection rules and models, are seamlessly delivered every few weeks, without requiring any operational support or causing disruption.<\/p>\n<p><a href=\"\/products\/assist-for-xdr\/\" title=\"learn more\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/10\/Forescout-Assist-screenshot.png\" class=\"u-size-full\" alt=\"Forescout Assist Screenshot\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Add 24\/7 Remote Monitoring with Assist for Threat Detection &amp; Response<\/h2>\n<p>Our team of experts operates as a remote, seamless extension of your SecOps team, to provide around-the-clock monitoring of your threat environment using eyeAlert. Services include security monitoring and triage, log source monitoring, threat investigation, incident management and threat hunting.<\/p>\n<p><a href=\"\/products\/assist-for-xdr\/\" title=\"Learn More about Assist\" class=\"c-btn c-btn--primary\">Learn More about Assist<\/a><\/p>\n<p><a name=\"f1\"><\/a><\/p>\n<p><em><sup>1<\/sup><small>11,000 alerts per day = 450 alerts per hour. Source: \u201cThe 2020 State of Security Operations,\u201d Forrester Consulting\u201d.<br \/>\nThe actual number of alerts a SOC receives depends on a many factors including the number, type and location of security controls deployed, the tuning of those controls (which is a function of analyst capacity, risk tolerance and level of expertise), the number of employees\/devices and industry.<\/small><\/em><br \/>\n<a name=\"f2\"><\/a><br \/>\n<em><sup>2<\/sup><small>Based on aggregate data averaged over a one-year period (Dec 2021-2022), across 30 enterprises, representing a range of company sizes and industries.<\/small><\/em>\n\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>eyeAlert Security operations center (SOC) teams face a daily barrage of incomplete and inaccurate alerts that lack vital contextual information, many of them false positives. As a result, analysts miss critical threats and take longer to investigate and respond to them, increasing the risk of a breach. See it in actionread the solution brief \u00a0 [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80912,"parent":79725,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-76191","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forescout eyeAlert<\/title>\n<meta name=\"description\" content=\"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/products\/eyealert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forescout eyeAlert\" \/>\n<meta property=\"og:description\" content=\"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/products\/eyealert\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T13:36:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"28 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/\",\"url\":\"https:\/\/www.forescout.com\/products\/eyealert\/\",\"name\":\"Forescout eyeAlert\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"datePublished\":\"2023-02-03T21:20:36+00:00\",\"dateModified\":\"2025-06-10T13:36:14+00:00\",\"description\":\"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/products\/eyealert\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Cybersecurity Products\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyealert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform\",\"item\":\"https:\/\/www.forescout.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"eyeAlert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forescout eyeAlert","description":"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/products\/eyealert\/","og_locale":"en_US","og_type":"article","og_title":"Forescout eyeAlert","og_description":"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.","og_url":"https:\/\/www.forescout.com\/products\/eyealert\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-06-10T13:36:14+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"28 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/products\/eyealert\/","url":"https:\/\/www.forescout.com\/products\/eyealert\/","name":"Forescout eyeAlert","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","datePublished":"2023-02-03T21:20:36+00:00","dateModified":"2025-06-10T13:36:14+00:00","description":"Eliminate cybersecurity alert fatigue, improve SOC efficiency and accelerate investigations of true threats.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/products\/eyealert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/products\/eyealert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/products\/eyealert\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Cybersecurity Products"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/products\/eyealert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.forescout.com\/products\/"},{"@type":"ListItem","position":3,"name":"eyeAlert"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/76191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=76191"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/76191\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80912"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=76191"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=76191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}