{"id":79055,"date":"2023-06-20T10:53:43","date_gmt":"2023-06-20T17:53:43","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/eyesight-copy\/"},"modified":"2025-09-08T09:05:18","modified_gmt":"2025-09-08T13:05:18","slug":"eyeinspect","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/products\/eyeinspect\/","title":{"rendered":"eyeInspect"},"content":{"rendered":"<h1>eyeInspect<\/h1>\n<h3>Deliver Industrial Cybersecurity At Scale<\/h3>\n<p>Forescout eyeInspect gives you the insight to secure every asset, network, and process across Cyber Physical Systems. It\u2019s more than visibility\u2014it\u2019s real-time asset intelligence, actionable risk, and threat detection in one platform.<\/p>\n<p><a href=\"\/ot-security-demo\/\">See it in action<\/a><a href=\"\/resources\/forescout-eyeinspect-datasheet\/\">Read the datasheet<\/a><\/p>\n<p>\u00a0<\/p>\n\n<h2 class=\"c-title\">Deploy on Your Terms. Anywhere, Any Network, Any Asset.<\/h2>\n<h5>Run eyeInspect on Forescout appliances, existing equipment, or certified partner hardware, minimizing deployment footprint and reducing costs without forcing architectural changes.<\/h5>\n<h3 class=\"c-stats__numbers\">\n350+<\/h3>\n<p class=\"c-stats__text\">Protocols\u00a0The Broadest Coverage Across OT, IoT, IoMT, BAS and CPS.<\/p>\n<h3 class=\"c-stats__numbers\">\n30+<\/h3>\n<p class=\"c-stats__text\">Discovery Methods\u00a0Tailored Visibility for Any Industrial Environment.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/no-text_Fully-air-gapped-icon.svg\" style=\"width:60%\" loading=\"lazy\"><\/p>\n<h4 style=\"color:#002f70\">Fully Air-Gapped<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/no-text_On-Prem-icon.svg\" style=\"width:60%\" loading=\"lazy\"><\/p>\n<h4 style=\"color:#d85204\">OnPrem<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/no-text_Hybrid-icon.svg\" style=\"width:60%\" loading=\"lazy\"><\/p>\n<h4 style=\"color:#88ad4f\">Hybrid<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/09\/no-text_Cloud-icon.svg\" style=\"width:60%\" loading=\"lazy\"><\/p>\n<h4 style=\"color:#009dea\">Cloud<\/h4>\n<h2 class=\"c-title\">Asset Intelligence: RealTime Insight, Beyond\u00a0Inventory<\/h2>\n<p>Disconnected tools and outdated inventories can\u2019t keep pace. Legacy OT, modern IT, and unmanaged IoT now share the same space, often outside your control. eyeInspect closes the gap. Continuous, automated discovery reveals every individual asset, how it behaves, and where it fits in your process. It delivers a complete, real-time view across all devices, networks, protocols, and Purdue levels.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/FS-2023-Site-Redesign-Asset-v1-Complete.svg\" style=\"width:40%\" alt=\"Complete Visibility\" loading=\"lazy\"><\/p>\n<h4>Comprehensive visibility<\/h4>\n<p>Maintain a live view of every asset, enriched with context on location, function, and behavior. Understand how systems interact and where dependencies create exposure.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Orchestration-blue-round-icon.svg\" style=\"width:40%\" loading=\"lazy\"><\/p>\n<h4>Change management<\/h4>\n<p>Automatically detect configuration changes, new vulnerabilities, policy violations, or risk score changes and receive alerts and scheduled reports to maintain continuous control.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/continous-defense-blue-round-icon.svg\" style=\"width:40%\" alt=\"Continuous monitoring\" loading=\"lazy\"><\/p>\n<h4>Actionable Insights<\/h4>\n<p>Role-based dashboards and dynamic network maps turn complex data into situational awareness, giving ICS\/SCADA engineers, SOC analysts, and executives the context to act quickly.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/FS-2023-Site-Redesign-Asset-v1-Classification.svg\" style=\"width:40%\" alt=\"150+ Classification Attributes\" loading=\"lazy\"><\/p>\n<h4>Ecosystem Integrations<\/h4>\n<p>Ready-made integrations with CMDBs, SIEMs, and other tools enrich asset data. Achieve seamless enterprise-wise asset intelligence combining eyeSight and eyeInspect.<\/p>\n<h3 class=\"c-title\">More Than a Vulnerability List:Prioritize What\u2019s Exploitable, Automatically<\/h3>\n<p>Vulnerability data means nothing without context. OT teams are flooded with alerts and CVEs they can\u2019t act on. We all know CVSS scores don\u2019t reflect what\u2019s actually exploitable in a live industrial environment. eyeInspect cuts through the noise with risk scoring built for OT realities: asset criticality, network exposure, and Known Exploited Vulnerabilities (KEV). Focus on what matters, secure what\u2019s un-patchable, and reduce risk exposure with confidence.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Cyber &amp; Operational Risk<\/h3>\n<p>Configurable risk scoring combines cyber and operational factors to prioritize not only cyber risks, but also misconfiguration and anomalies with potential impact on uptime, safety, and business continuity.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Advanced Vulnerability Management<\/h3>\n<p>Leverage the industry\u2019s largest curated CPS vulnerability database and CISA\/Vedere Labs KEVs to prioritize patching, suppress false positives, and manage remediation cases.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Industrial Threat Library<\/h3>\n<p>A CPS specific library of TTPs and IOCs that works out of the box with no configuration required, enabling you to assess your environment instantly and detect known threats immediately.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/10\/dotted-arrow.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small\">Unified Risk Metrics<\/h3>\n<p>Integrate with eyeFocus to deliver consistent risk scoring across IT and OT. Leadership gains a single source of truth to track posture, guide decisions, and report confidently to the board.<\/p>\n<h2 class=\"c-title\">Threat Detection with Actionable Context<\/h2>\n<p>Most tools flood analysts with alerts but fail to explain what\u2019s happening, why it matters, or what to do next. This gap means wasted time and missed signals. Forescout goes beyond raw alerts. eyeInspect classifies events in an analyst-friendly interface and maps them to the MITRE ATT&amp;CK for ICS. Then, it adds the actionable context you need to act. <\/p>\n<p><strong>The result? Faster triage. Cut through the noise. Clear prioritization. <\/strong><\/p>\n<h4>Threat Detection Precision<\/h4>\n<p>Real-time detection and advanced event classification provide clear context through an actionable analyst interface, helping your team analyze and prioritize events faster.<\/p>\n<h4>Configuration &amp; Extensibility<\/h4>\n<p>Tune detection to your environment with templates and custom rules, cut noise through alert frequency and event consolidation, and expand coverage with your own logic, use cases, or IoCs.<\/p>\n<h4>OT Threat Intelligence<\/h4>\n<p>Powered by Vedere Labs, detections integrate adversary TTPs, IoCs, and IoAs, giving analysts clear insight into unfolding attacks, what could happen next, and how best to respond.<\/p>\n<h4>Coordinate Response<\/h4>\n<p>Integrated with eyeAlert, detection spans over 180 IT\/OT data sources, including FW, SIEM, XDR etc. and turns alerts into orchestrated actions across your security stack, ensuring threats are contained.<\/p>\n<h2 class=\"c-title\">Beyond the Perimeter: OT Network Protection<\/h2>\n<p>Flat, unmonitored networks make it easy for little mistakes to become big problems. A misconfigured device, an insecure service, or a forgotten connection can quickly ripple through operations, interrupting production and exposing critical systems. eyeInspect provides internal network security monitoring and enables dynamic segmentation. Automated enforcement policies contain risks and keep communications under control \u2014without slowing you down.<\/p>\n<h3 class=\"c-card__title\">Continuous Monitoring <\/h3>\n<p>Baselines network and process behavior and continuously detects anomalies, insecure services, configuration flaws, and communication errors to maintain resilient and reliable operations.<\/p>\n<h3 class=\"c-card__title\">Policy &amp; Compliance<\/h3>\n<p>Use the built-in integration with the Forescout network security suite to manage policies across zones, users, and devices to ensure consistent security and simplified compliance.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyecontrol\" title=\"explore eyeControl\" class=\"c-read-more c-link-expand u-mt-auto\">explore eyeControl<\/a><\/p>\n<h3 class=\"c-card__title\">NAC &amp; Segmentation <\/h3>\n<p>Leverage the 4D \u2122 platform to enforce NAC and zone-based segmentation, managing transient devices and remote connections while ensuring only authorized access to your resources.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/products\/eyesegment\/\" title=\"Explore eyeSegment\" class=\"c-read-more c-link-expand u-mt-auto\">Explore eyeSegment<\/a><\/p>\n<h3 class=\"c-card__title\">AI-Driven Reporting<\/h3>\n<p>Generate configurable, role-based reports aligned with OT compliance standards like NIST CSF, NERC CIP, and IEC 62443, with flexible scheduling and easy customization.<\/p>\n<h2 style=\"text-align: center\">Unlock More Value from eyeInspect<\/h2>\n<p style=\"text-align: center\">Enhance your deployment through integrations designed to expand coverage and improve control of your environment.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2018\/07\/keysight_logo.png\" alt=\"\" width=\"617\" height=\"141\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/Xona-Logo-color-nobg-800px.webp\" alt=\"\" width=\"800\" height=\"182\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/11\/Microsoft-logo_rgb_nobg.webp\" alt=\"\" width=\"1427\" height=\"314\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/Logo-ITSM-ServiceNow.svg\" alt=\"ServiceNow\" width=\"125\" height=\"19\" role=\"img\"><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"u-radius-none\" style=\"width:90%;padding:5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/08\/Frenos-logo-color-nobg-800px.webp\" alt=\"\" width=\"800\" height=\"140\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>eyeInspect Deliver Industrial Cybersecurity At Scale Forescout eyeInspect gives you the insight to secure every asset, network, and process across Cyber Physical Systems. It\u2019s more than visibility\u2014it\u2019s real-time asset intelligence, actionable risk, and threat detection in one platform. See it in actionRead the datasheet \u00a0 Deploy on Your Terms. Anywhere, Any Network, Any Asset. Run [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80912,"parent":79725,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-79055","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>eyeInspect - Forescout<\/title>\n<meta name=\"description\" content=\"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/products\/eyeinspect\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"eyeInspect - Forescout\" \/>\n<meta property=\"og:description\" content=\"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/products\/eyeinspect\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-08T13:05:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/\",\"url\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/\",\"name\":\"eyeInspect - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"datePublished\":\"2023-06-20T17:53:43+00:00\",\"dateModified\":\"2025-09-08T13:05:18+00:00\",\"description\":\"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/products\/eyeinspect\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Cybersecurity Products\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyeinspect\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform\",\"item\":\"https:\/\/www.forescout.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"eyeInspect\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"eyeInspect - Forescout","description":"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/products\/eyeinspect\/","og_locale":"en_US","og_type":"article","og_title":"eyeInspect - Forescout","og_description":"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..","og_url":"https:\/\/www.forescout.com\/products\/eyeinspect\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-09-08T13:05:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/","url":"https:\/\/www.forescout.com\/products\/eyeinspect\/","name":"eyeInspect - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","datePublished":"2023-06-20T17:53:43+00:00","dateModified":"2025-09-08T13:05:18+00:00","description":"Leverage OT\/ICS cybersecurity platform with Threat Detection to gain visibility and comply with NERC CIP, IEC 62443, NIST CSF and other standards..","breadcrumb":{"@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/products\/eyeinspect\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Cybersecurity Products"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/products\/eyeinspect\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.forescout.com\/products\/"},{"@type":"ListItem","position":3,"name":"eyeInspect"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79055"}],"version-history":[{"count":3,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79055\/revisions"}],"predecessor-version":[{"id":108281,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79055\/revisions\/108281"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80912"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79055"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}