{"id":77978,"date":"2023-05-12T06:02:17","date_gmt":"2023-05-12T13:02:17","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/solutions\/solution-page-template-wip-230316-copy\/"},"modified":"2025-09-11T09:47:20","modified_gmt":"2025-09-11T13:47:20","slug":"ot-security","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/ot-security\/","title":{"rendered":"OT Security"},"content":{"rendered":"<h1>OT Security<\/h1>\n<h3>Reduce operational and Cyber-Physical Systems risk in OT\/ICS and SCADA\u00a0environments<\/h3>\n<p>Industrial digitalization has accelerated the convergence of IT, IoT and OT assets and networks, increasing the complexity and vulnerability of previously isolated OT and ICS\u00a0networks.<\/p>\n<p>With industrial environments increasingly dependent on Cyber-Physical Systems (CPS) for production, you need a protection platform with continuous asset discovery, assessment, and governance to ensure regulatory compliance and avoid downtime \u2013 so you can detect and remediate cyber threats before they lead to operational\u00a0incidents.<\/p>\n<p><a href=\"#demochoice\">get a demo<\/a><a href=\"\/resources\/ics-solution-brief\/\">Read the solution brief<\/a><\/p>\n<p>\u00a0<\/p>\n\n<h2 style=\"text-align: center\">One Platform.<br \/>\nBuilt to Protect What Can\u2019t\u00a0Fail.<\/h2>\n<h3 style=\"text-align: center\">Complete coverage nobody else delivers.<\/h3>\n<p style=\"text-align: center\">Other OT security solutions stop at visibility and detection. We go further. We don\u2019t just show you what\u2019s wrong. We help you act \u2014 contain threats, enforce policy, and continuously improve your security posture across IT, OT, IoT, IoMT, and CPS environments.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-108181\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/otsec-diagram-desktop.svg\" alt=\"\" width=\"1604\" height=\"230\"><br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-108182\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/otsec-page-diagram-mobile.svg\" alt=\"\" width=\"806\" height=\"471\">\n<h2 style=\"text-align: center\">Real Orchestration Beyond Integration<\/h2>\n<h4 style=\"text-align: center\">You choose the best technology, we make it work together.<\/h4>\n<p style=\"text-align: center\">We unify tools into a single, coherent view with shared context, consistent data, and metrics across your stack. More than surface-level integration, this is unified orchestration that delivers smarter workflows, faster decisions, and better use of what you already use.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/11\/Microsoft-logo_rgb_nobg.webp\" alt=\"\" width=\"1427\" height=\"314\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/ServiceNow-2.svg\" alt=\"ServiceNow\" width=\"105\" height=\"15\" role=\"img\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/DeNexus-logo-color-nobg-800px.webp\" alt=\"\" width=\"800\" height=\"149\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/Xona-Logo-color-nobg-800px.webp\" alt=\"\" width=\"800\" height=\"182\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/Xage-logo-color-773px-nobg.webp\" alt=\"\" width=\"773\" height=\"285\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/Frenos-logo-color-nobg-800px.webp\" alt=\"\" width=\"800\" height=\"140\"><\/p>\n<h2 class=\"c-title\">Deploy What You Need, How You Need It<\/h2>\n<h3>Deploy on your terms \u2014 without redesigning your architecture. <\/h3>\n<p>Cloud, on-prem, air-gapped, or hybrid, we adapt to your environment. From passive monitoring to active queries, agent-based or API-driven. Deploy with our proprietary appliances, build your own sensors, or run directly our containers on existing networking equipment. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/otsec-page-it-ot-infrastructure.webp\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title\">Threat Intelligence That Speaks OT<\/h2>\n<h3>See what\u2019s coming, because we\u2019ve already seen it.<\/h3>\n<p>Backed by over a decade of focused ICS research, our threat intelligence transforms raw signals into actionable insight. From ransomware to supply chain attacks and living-off-the-land techniques, we deliver context that helps you understand what\u2019s relevant, prioritize what\u2019s dangerous, and act before threats impact your operations.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/sun-down-a-dark-side-to-solar-energy-grids\/\" title=\"Read the report\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/sundown-report-thumbnail.webp\" style=\"width:264px;height:330px\" loading=\"lazy\"><\/a><br \/>\n<a href=\"https:\/\/www.forescout.com\/research-labs\/sun-down-a-dark-side-to-solar-energy-grids\/\" title=\"Read the report\" class=\"c-read-more u-mt-auto cta-link\">Read the report<\/a>\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/ot-icefall\/\" title=\"Read the report\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/MicrosoftTeams-image-29.png\" style=\"width:264px;height:330px\" alt=\"OT Icefall Conclusion\" loading=\"lazy\"><\/a><br \/>\n<a href=\"https:\/\/www.forescout.com\/research-labs\/ot-icefall\/\" title=\"Read the report\" class=\"c-read-more u-mt-auto cta-link\">Read the report<\/a>\n<p><a href=\"https:\/\/www.forescout.com\/research-labs\/the-riskiest-devices-of-2025\/\" title=\"Read the report\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/03\/Riskiest-2025-Report-Cover-V2.webp\" style=\"width:264px;height:330px\" loading=\"lazy\"><\/a><br \/>\n<a href=\"https:\/\/www.forescout.com\/research-labs\/the-riskiest-devices-of-2025\/\" title=\"Read the report\" class=\"c-read-more u-mt-auto cta-link\">Read the report<\/a>\n<p><a href=\"https:\/\/www.forescout.com\/blog\/exposing-the-exploited-analyzing-vulnerabilities-that-live-in-the-wild\/\" title=\"Read the report\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-VL-KEV-Exploited-Report-Thumb-v1-440x554-1.png\" style=\"width:264px;height:330px\" loading=\"lazy\"><\/a><br \/>\n<a href=\"https:\/\/www.forescout.com\/blog\/exposing-the-exploited-analyzing-vulnerabilities-that-live-in-the-wild\/\" title=\"Read the report\" class=\"c-read-more u-mt-auto cta-link\">Read the report<\/a>\n<p>Achieve real-time visibility across your industrial environment to continuously identify, track, and manage every device. Use passive discovery, active queries, direct infrastructure integration or APIs to gain complete coverage across IT, OT, IoT, IoMT, and BAS systems. Read more\u2026<br \/>\n\u00a0\n<ul>\n<li>Automatically manage asset lifecycle events from initial deployment to decommissioning.<\/li>\n<li>Enable change monitoring to detect new devices, configuration drift, or policy violations.<\/li>\n<li>Optimize operations through asset insights that reduce downtime and improve performance.<\/li>\n<li>Unify IT and OT workflows by syncing asset data across CMDB and ITSM systems.<\/li>\n<\/ul>\n<p>Continuously evaluate threats, vulnerabilities, and compliance gaps across your industrial environment. Get a unified view of enterprise risk, with contextual analysis to support fast, informed decisions \u2014 and prioritize what truly puts your operations at risk.<br \/>\n\u00a0\n<ul>\n<li>Detect and manage unpatched systems using a curated vulnerability database enriched with EPSS, CISA KEVs, and Vedere Labs threat intelligence.<\/li>\n<li>Continuously assess and prioritize cyber and operational risk with real-time, contextual insights across assets, systems and sites.<\/li>\n<li>Identify risks to critical processes early and strengthen business continuity with predictive insights and real-time operational awareness.<\/li>\n<\/ul>\n<p>Integrated enterprise threat monitoring using 180+ data sources to deliver complete detection coverage and correlated insight across IT, OT, and cyber-physical systems. Reduce noise and false positives, ease alert fatigue for analysts, and accelerate response with high-confidence detections.<br \/>\n\u00a0\n<ul>\n<li>Bridge the divide between IT and OT with unified detection that scales across your entire operational infrastructure, identifying both security threats and process anomalies in real time.<\/li>\n<li>Leverage Vedere Labs intelligence to detect emerging threats early, enrich alerts with real-world context, and enable faster, more proactive defense.<\/li>\n<li>Streamline investigations with a role-based interface, high-fidelity event classification, contextual alerts, and guided response playbooks to reduce noise and optimize analyst workflows.<\/li>\n<li>Apply Gen AI to accelerate event investigation and attack path analysis, helping analysts quickly understand what happened, how it spread, and what to do next.<\/li>\n<\/ul>\n<p>Apply consistent security and compliance policies across diverse systems, vendors, and sites. Replace fragmented oversight with centralized governance that maps controls to IEC 62443, NIST CSF 2.0, NIS2, and NERC CIP \u2014 and sets a strong foundation for Zero Trust in industrial environments.<br \/>\n\u00a0\n<ul>\n<li>Create, test, and deploy security and compliance policies from a centralized interface, ensuring consistent enforcement across vendors, systems, and globally distributed sites.<\/li>\n<li>Define granular network access and segmentation rules to create zones and conduits that minimize attack surface, enforce least privilege, and contain lateral movement.<\/li>\n<li>Automate remediation to reduce manual workload, close exposure faster, and prevent minor issues from escalating into business-impacting incidents.<\/li>\n<li>Use GenAI to generate tailored reports and audit summaries. Monitor KPIs and compliance status through persona-based views that improve visibility and streamline collaboration across teams.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/analyst-report-gartner-magic-quadrant-for-cps-protection-platforms-2025\/\" title=\"dive in\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Gartner-Magic-Quadrant-for-CPS-2025-official-cover.webp\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Gartner\u2019s Inaugural Magic Quadrant for CPS Protection Platforms<\/h2>\n<p>Forescout is proud to be included in the inaugural report on Cyber-Physical Systems platforms which include the best practices for evaluating and selecting a vendor \u2013 and the broader market trends driving platform adoption. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/analyst-report-gartner-magic-quadrant-for-cps-protection-platforms-2025\/\" title=\"get report\" class=\"c-btn c-btn--yellow c-btn--outline has-icon icon-duotone-triangles-right icon-position-right has-icon-animation icon-animation-fade-in\">get report<\/a><\/p>\n<h2 class=\"c-title\">Related Products<\/h2>\n<p><a href=\"\/products\/eyeinspect\/\" title=\"Explore eyeInspect\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/eyeInspect-demo-in-screen-teaser.gif\" alt=\"Forescout EyeInspect\" loading=\"lazy\"><\/a><\/p>\n<h3>eyeInspect<\/h3>\n<p>Gain complete device visibility through deep packet inspection of all industrial network protocols and baseline assets.<\/p>\n<p><a href=\"\/products\/eyeinspect\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OT Security Reduce operational and Cyber-Physical Systems risk in OT\/ICS and SCADA\u00a0environments Industrial digitalization has accelerated the convergence of IT, IoT and OT assets and networks, increasing the complexity and vulnerability of previously isolated OT and ICS\u00a0networks. With industrial environments increasingly dependent on Cyber-Physical Systems (CPS) for production, you need a protection platform with continuous [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80914,"parent":80153,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-77978","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OT Security Platform &amp; Security Software Tools<\/title>\n<meta name=\"description\" content=\"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform &amp; Tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/ot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OT Security Platform &amp; Security Software Tools\" \/>\n<meta property=\"og:description\" content=\"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform &amp; Tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/ot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T13:47:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/\",\"name\":\"OT Security Platform & Security Software Tools\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"datePublished\":\"2023-05-12T13:02:17+00:00\",\"dateModified\":\"2025-09-11T13:47:20+00:00\",\"description\":\"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform & Tools.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/ot-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Demo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/ot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OT Security Platform & Security Software Tools","description":"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform & Tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/ot-security\/","og_locale":"en_US","og_type":"article","og_title":"OT Security Platform & Security Software Tools","og_description":"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform & Tools.","og_url":"https:\/\/www.forescout.com\/solutions\/ot-security\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-09-11T13:47:20+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/","url":"https:\/\/www.forescout.com\/solutions\/ot-security\/","name":"OT Security Platform & Security Software Tools","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","datePublished":"2023-05-12T13:02:17+00:00","dateModified":"2025-09-11T13:47:20+00:00","description":"Discover, assess and respond with Forescout to reduce OT risks. Safeguard operational tech with our OT Security Platform & Tools.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/ot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Demo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/ot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"OT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/use-case-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/77978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=77978"}],"version-history":[{"count":3,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/77978\/revisions"}],"predecessor-version":[{"id":108339,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/77978\/revisions\/108339"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80914"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=77978"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=77978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}