{"id":79725,"date":"2023-07-13T05:43:09","date_gmt":"2023-07-13T12:43:09","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/network-access-control-copy\/"},"modified":"2025-08-18T11:50:15","modified_gmt":"2025-08-18T15:50:15","slug":"products","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/products\/","title":{"rendered":"Platform"},"content":{"rendered":"<h1>The Forescout 4D Platform\u2122<\/h1>\n<h3>Manage risks. Contain events. Mitigate threats.<\/h3>\n<p>The Forescout 4D Platform\u2122 continuously identifies, protects and ensures the compliance of all managed and unmanaged cyber assets \u2013 IT, IoT, IoMT and OT \u2013 without business disruption. It delivers comprehensive capabilities for network security, risk and exposure management, and extended detection and response. With seamless context sharing and workflow orchestration via ecosystem partners, it enables you to more effectively manage cyber risk and mitigate threats.<\/p>\n<p>Schedule a demo \u00a0\u00a0\u00a0read the solution brief<\/p>\n<p>\u00a0<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">What the Forescout 4D Platform<sup>\u2122<\/sup> Can Do for You<\/h2>\n<p>See how the Forescout 4D Platform<sup>\u2122<\/sup> gives visibility to unseen assets integrating security operations with compliance to confidently manage risk.<\/p>\n<h2 class=\"c-title\">Key Features &amp; Benefits<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Classification-blue-round-icon.svg\" style=\"width:40%\" loading=\"lazy\"><\/p>\n<h4>Classification<\/h4>\n<p>Real-time and continuous agentless discovery and classification of both managed and unmanaged assets; traditional IT, IoT, IoMT, and OT\/ICS. Using, high-fidelity asset classification powered by Forescout Cloud.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/06\/FS-2023-Site-Redesign-Asset-v1-Classification.svg\" style=\"width:40%\" alt=\"150+ Classification Attributes\" loading=\"lazy\"><\/p>\n<h4>Policy Enforcement<\/h4>\n<p>Understand gaps in your compliance or security posture and leverage Forescout\u2019s centralized policy engine to reduce your exposure risk and drive a closer alignment to your goals, desired state and your security framework.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/improve-round-blue-icon.svg\" style=\"width:40%\" alt=\"Automate security policies\" loading=\"lazy\"><\/p>\n<h4>Cybersecurity Automation<\/h4>\n<p>The Forescout 4D Platform<sup>\u2122<\/sup> enables systems to share policy-based decisions to automate proactive and reactive security controls, to reduce your exposure and minimize incident response time through a coordinated, instantaneous response.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/bar-chart-blue-round-icon.svg\" style=\"width:40%\" alt=\"Minimize business disruption\" loading=\"lazy\"><\/p>\n<h4>Analytics<\/h4>\n<p>Rich contextual visualizations delivered through persona-based dashboards, powered by Forescout comprehensive intelligence, providing meaningful insights in to risks, threats, behaviours and compliance state<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Flexible-round-blue-icon.svg\" style=\"width:40%\" alt=\"Flexible Deployment\" loading=\"lazy\"><\/p>\n<h4>APIs \/ Ecosystem<\/h4>\n<p>Enhance existing security investments, by dynamically sharing device identity, configuration state, risk attributes, and threat context with other security tools. This bidirectional data exchange provides a great return-on-investment across your security ecosystem.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Orchestration-blue-round-icon.svg\" style=\"width:40%\" loading=\"lazy\"><\/p>\n<h4>Orchestration<\/h4>\n<p>Share real-time device context between the Forescout 4D Platform<sup>\u2122<\/sup> and more than 70 third-party IT and security products, orchestrate workflows across disparate tools, and accelerate system-wide response to mitigate risks, and respond to threats.<\/p>\n<h2 class=\"c-title\">Network Security<\/h2>\n<h3>Assess, segment and enforce with proactive and reactive controls<\/h3>\n<h4>Network Access Control<\/h4>\n<p>Continuously monitor all connected assets to govern access to the enterprise-wide network infrastructure, through flexible and dynamic network access policies<\/p>\n<h4>Risk &amp; Threat Containment<\/h4>\n<p>Reduce your blast radius with real-time pinpoint network controls, giving you the time to properly mitigate or remediate security concerns<\/p>\n<h4>Segmentation Management<\/h4>\n<p>Remove the complexity of deploying network segmentation \u2013 monitor and maintain your network controls with real-time traffic visibility to avoid gaps and misconfigurations<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-security\/\" title=\"Explore Solution\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-fade-in\">Explore Solution<\/a><\/p>\n<h2 class=\"c-title\">Risk &amp; Exposure Management<\/h2>\n<h3>Identify, quantify and prioritize cybersecurity risk &amp; compliance<\/h3>\n<h4>Cyber Asset Management<\/h4>\n<p>Discover and assess every connected cyber asset to provide real-time awareness of your attack surface<\/p>\n<h4>Visibility &amp; Compliance<\/h4>\n<p>Leverage data collected by Forescout that enables the most accurate CMDB and full asset history<\/p>\n<h4>Risk Prioritization<\/h4>\n<p>Identify high-risk cyber assets to prioritize response actions and minimize exposure caused by vulnerabilities and misconfiguration<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/risk-and-exposure-management\/\" title=\"Explore Solution\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-fade-in\">Explore Solution<\/a><\/p>\n<h2 class=\"c-title\">Threat Detection &amp; Response<\/h2>\n<h3>Detect, investigate and respond to true threats and incidents<\/h3>\n<h4>True Threat Correlation<\/h4>\n<p>Help eliminate alert noise to better detect advanced threats, and provide automated responses across your entire enterprise<\/p>\n<h4>Optimized Security Operations<\/h4>\n<p>Automate, simplify and accelerate TDIR processes and help eliminate alert fatigue, from a single console<\/p>\n<h4>SecOps Visibility<\/h4>\n<p>Get comprehensive visibility into a broad range of critical SOC performance metrics via persona-based dashboards and reports<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/threat-detection-and-response\/\" title=\"Explore Solution\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-fade-in\">Explore Solution<\/a><\/p>\n<h2 class=\"c-title\">OT Security<\/h2>\n<h3>Reduce operational and security risk in converged OT\/IT environments<\/h3>\n<h3>Zero Downtime<\/h3>\n<p>Avoid operational disruption with passive monitoring using DPI of 250+ protocols, non-intrusive vulnerability identification and flexible mitigation actions<\/p>\n<h3>Threat Detection &amp; Response<\/h3>\n<p>Detect misconfigurations, operational errors and advanced cyberattacks using ICS-specific threat indicators aligned with MITRE ATT&amp;CK for ICS<\/p>\n<h3>Standards Compliance<\/h3>\n<p>Streamline compliance with dashboards, analytics and reporting tools aligned with NERC CIP, EU NIS Directive, NIST CSF and IEC 62443<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/ot-security\/\" title=\"Explore solution\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-idea icon-position-right has-icon-animation icon-animation-fade-in\">Explore solution<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Forescout 4D Platform\u2122 continuously identifies, protects and ensures the compliance of all managed and unmanaged cyber assets \u2013 IT, IoT, IoMT and OT.<\/p>\n","protected":false},"author":165,"featured_media":80912,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-79725","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Platform: IT &amp; OT Security Software Tool<\/title>\n<meta name=\"description\" content=\"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/products\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Platform: IT &amp; OT Security Software Tool\" \/>\n<meta property=\"og:description\" content=\"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/products\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T15:50:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/products\/\",\"url\":\"https:\/\/www.forescout.com\/products\/\",\"name\":\"Cybersecurity Platform: IT & OT Security Software Tool\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"datePublished\":\"2023-07-13T12:43:09+00:00\",\"dateModified\":\"2025-08-18T15:50:15+00:00\",\"description\":\"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/products\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/products\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Cybersecurity Products\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Platform: IT & OT Security Software Tool","description":"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/products\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Platform: IT & OT Security Software Tool","og_description":"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.","og_url":"https:\/\/www.forescout.com\/products\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-08-18T15:50:15+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/products\/","url":"https:\/\/www.forescout.com\/products\/","name":"Cybersecurity Platform: IT & OT Security Software Tool","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/products\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","datePublished":"2023-07-13T12:43:09+00:00","dateModified":"2025-08-18T15:50:15+00:00","description":"The only automated cybersecurity platform that offers continuous discovery, assessment and control of all managed and unmanaged assets.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/products\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/products\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/products\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Cybersecurity Products"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Platform"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79725"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725\/revisions"}],"predecessor-version":[{"id":107871,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725\/revisions\/107871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80912"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79725"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}