{"id":79971,"date":"2023-07-14T16:04:47","date_gmt":"2023-07-14T23:04:47","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/risk-and-exposure-management-copy\/"},"modified":"2025-06-09T10:03:10","modified_gmt":"2025-06-09T14:03:10","slug":"eyefocus","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/products\/eyefocus\/","title":{"rendered":"eyeFocus"},"content":{"rendered":"<h1>eyeFocus<\/h1>\n<h3>Identify, quantify and prioritize cybersecurity risk\u00a0and\u00a0compliance<\/h3>\n<p>Forescout eyeFocus is a comprehensive asset intelligence solution that provides the foundation for understanding the security posture of your attack surface, through risk-based prioritization and persistent asset intelligence.<\/p>\n<p>See it in actionread the solution brief<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Benefits<\/h2>\n<p>eyeFocus drives greater alignment with compliance frameworks and helps close exposure gaps to better protect organizations from the risk of a breach.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/persistent-asset-intelligence-icon.svg\" style=\"width:35%\" loading=\"lazy\"><\/p>\n<h3>Persistent Asset Intelligence<\/h3>\n<p>A simplified way to maintain real-time and persistent asset intelligence for every device \u2013 managed or unmanaged, physical or virtual, including operational technology and industrial control systems (OT\/ICS), Internet of Things (IoT) devices and specialty subsets like medical devices.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/cybersecurity-risk-score-icon.svg\" style=\"width:35%\" loading=\"lazy\"><\/p>\n<h3>Cybersecurity Risk Score<\/h3>\n<p>Situational awareness of cybersecurity risk posture based on exposure from vulnerabilities and misconfiguration, with a unique multifactor risk score that correlates risk and exposure factors across configuration, function and behavior.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Proactive-security-defense-icon.svg\" style=\"width:35%\" loading=\"lazy\"><\/p>\n<h3>Proactive Security Defense<\/h3>\n<p>The only way to truly defend yourself is to move beyond visibility to understanding, by identifying the exposure of your attack surface, quantifying the risk that presents to your business and prioritizing remediation before breaches occur.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/data-sharing.svg\" style=\"width:35%\" alt=\"Operational Risk &amp; Compliance Analysis\" loading=\"lazy\"><\/p>\n<h3>Asset Posture History<\/h3>\n<p>Contextualized asset data maintained in a searchable 90-day persistent asset inventory, so you can track changes in configuration and risk posture over time.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/discover-trends.svg\" style=\"width:35%\" alt=\"Anomalous Behavior &amp; Threat Detection\" loading=\"lazy\"><\/p>\n<h3>Identify Exposure Gaps<\/h3>\n<p>Non-disruptive discovery, classification and security assessment of non-managed devices including OT, IoT and IoMT using Forescout\u2019s patented deep packet inspection (DPI) technology to identify and act on exposure gaps in your security framework.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/magnifying-glass-pulse-icon-bluegray.svg\" style=\"width:35%\" alt=\"Forescout Accelerate Incident Response\" loading=\"lazy\"><\/p>\n<h3>Accelerate Incident Response<\/h3>\n<p>Searchable history of asset configuration changes over time for faster incident investigation and for discovering coverage gaps in vulnerability management. Leverage historical asset context to aid proactive investigation of risks and reactive response to incidents and events.<\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">See a Demo<\/h2>\n<p>Watch CTO Justin Foster run through key features in eyeFocus.<\/p>\n<p><a href=\"\/rem-demo-request\/\" title=\"schedule a demo\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-fade-in\">schedule a demo<\/a><\/p>\n<h2 class=\"c-title\">Key Use Cases<\/h2>\n<p>eyeFocus provides clear and concise asset intelligence for every connected asset regardless of type. It continuously tracks the cybersecurity risk posture of all connected devices by calculating a multifactor risk score and makes real-time and persistent asset data available across IT and security teams to aid both proactive risk remediation and reactive incident investigation.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/caasm-on-screen-1.png\" class=\"u-size-full\" alt=\"Forescout Risk &amp; Exposure Management Product Screenshot\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Cybersecurity Asset Management<\/h2>\n<h5>Clear and concise asset intelligence for every connected asset regardless of type.<\/h5>\n<p>Achieve a persistent and accurate asset inventory with historical tracking of device status and configuration changes with cloud-powered classification for both managed and unmanaged devices (IT, IoT, IoMT, OT\/ICS).<\/p>\n<p><a href=\"\/rem-demo-request\/\" title=\"See it in Action\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-demo icon-position-right has-icon-animation icon-animation-fade-in\">See it in Action<\/a><\/p>\n<p style=\"text-align: left\"><strong>Attack Surface Asset Inventory<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">High-fidelity, cloud-powered classification of managed and unmanaged devices<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Persistent Asset Context<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">90-day retention and tracking of rich contextual asset data<\/li>\n<li style=\"text-align: left\">Timeline of device state and configuration changes<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Exposure Profile Filtering<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Advanced filtering capabilities to help locate and track assets that share common exposure attributes with compromised assets so you can proactively remediate them<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/cyber-risk-intelligence-on-screen-1.png\" class=\"u-size-full\" alt=\"Cyber Risk Intelligence Product\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Cyber Risk Intelligence<\/h2>\n<h5>A quantified understanding of overall attack surface risk and individual asset risk.<\/h5>\n<p>Proactively safeguard the network and continuously track the cybersecurity risk posture of all connected devices by calculating a multifactor risk score based on configuration, function and behavior. <\/p>\n<p style=\"text-align: left\"><strong>Configuration<\/strong><\/p>\n<p style=\"text-align: left\">Understand the unique configuration requirements of each individual asset by classification to identify its exposure and exploitability of its vulnerabilities:<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Common Vulnerabilities and Exposures (CVEs) correlated to the CISA Known Exploited Vulnerabilities (KEVs) catalog<\/li>\n<li style=\"text-align: left\">Exploit Prediction Scoring System (EPSS)<\/li>\n<li style=\"text-align: left\">Exposed Services, Open Ports, and potential exposure level (contro or access)<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Function<\/strong><\/p>\n<p style=\"text-align: left\">Establish a logical business taxonomy of device criticality based on its function through Forescout\u2019s native understanding and experience, or tailor criticality levels based on:<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Predefined criticality by function<\/li>\n<li style=\"text-align: left\">Customizable criticality through Forescout policies<\/li>\n<li style=\"text-align: left\">Device criticality from ServiceNow via Forescout eyeExtend<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Behavior<\/strong><\/p>\n<p style=\"text-align: left\">Track configuration and behavior changes of each asset to detect anomalies that may increase risk of compromise, including patterns such as two-way direct communication between an asset and the internet:<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Internet exposure<\/li>\n<li style=\"text-align: left\">Additional behavior factors <strong>(coming soon)<\/strong><\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/medical-device-security-on-screen-1.png\" class=\"u-size-full\" alt=\"Forescout Medical Device Security Product Screenshot\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Medical Device Security<\/h2>\n<h5>Extend cybersecurity, privacy and asset compliance for healthcare networks.<\/h5>\n<p>Advancements in technology-enabled healthcare have led to an explosive growth of interconnected IoT, OT, IT,\u00a0<a href=\"\/solutions\/medical-device-security\/\">IoMT and medical devices<\/a>, all to improve patient care and outcomes. Along with advancements come risks and an ever-increasing attack surface.<\/p>\n<p>eyeFocus helps provide a clear and concise risk assessment of each connected medical device based on known exposures, attack potential and operational criticality, with insights into FDA class and recall status, to help ensure security without impacting patient care.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: left\"><strong>High-fidelity, passive IoMT device discovery and classification.<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Non-disruptive discovery, classification and security assessment of unmanaged devices including OT, IoT and IoMT using Forescout\u2019s patented DPI technology to identify and act on exposure gaps in your security framework.<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Flag medical devices with open FDA recall notices<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Maintain awareness and visibility of operational and patient safety with detailed FDA recall information for every IoMT asset<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/operational-efficiency-on-screen-1.png\" class=\"u-size-full\" alt=\"Forescout Operational Efficiency Screen\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Operational Efficiency<\/h2>\n<h5>Spend less time investigating incidents and designing proactive remediation policies.<\/h5>\n<p>Expand the availability of Forescout real-time and persistent asset data across IT and security teams to aid both proactive risk remediation and reactive incident investigation.<\/p>\n<p style=\"text-align: left\"><strong>Access-Anywhere Asset Intelligence<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">eyeFocus\u2019 cloud-native console provides greater availability and easy access to rich contextual asset intelligence across all IT and security teams.<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Risk-based Prioritization<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Leverage risk and exposure attributes combined with asset compliance and configuration state intelligence to aid incident investigation and the design of remediation workflows.<\/li>\n<\/ul>\n<p style=\"text-align: left\"><strong>Historical Asset Context<\/strong><\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left\">\n<li style=\"text-align: left\">Accelerate risk analysis and incident response to help minimize the blast radius and reduce mean-time-to-resolution (MTTR).<\/li>\n<\/ul>\n<h2 class=\"c-title\">How It Works<\/h2>\n<p><strong>Modern Asset View<\/strong><\/p>\n<p>A modern, single view of all asset types, with normalized data. The user-friendly interface lets you easily view and manage assets in your network.<\/p>\n<p><strong>Multifactor Risk Score<\/strong><\/p>\n<p>A unique multifactor risk score that correlates information from the asset\u2019s configuration, function and behavior and tracks risk status over time.<\/p>\n<p><strong>Risk &amp; Exposure Attributes<\/strong><\/p>\n<p>Risk and exposure attributes can be correlated to asset compliance and configuration state to aid incident investigation and the design of remediation workflows \u2013 so you can focus on the most critical assets and mitigate risks more efficiently.<\/p>\n<p><strong>Cloud Classification<\/strong><\/p>\n<p>Cloud classification for high-fidelity unmanaged assets provides a more detailed classification of these assets, allowing you to identify and manage them more effectively.<\/p>\n<p><strong>Exposure Profile Filtering<\/strong><\/p>\n<p>Advanced filtering capabilities to help you locate and track assets that share common exposure attributes with compromised assets so you can proactively remediate them.<\/p>\n<p><strong>EPSS and CISA KEVs Correlation<\/strong><\/p>\n<p>Correlation with the EPSS and CISA KEVs catalog enables risk-scoring factors that estimate the likelihood of exploiting software vulnerabilities in the wild, helping you prioritize your vulnerability management efforts.<\/p>\n<p><strong>Persistent Asset Data<\/strong><\/p>\n<p>A searchable 90-day persistent asset inventory to help you monitor asset security posture over time.<\/p>\n<p><strong>Deep Packet Inspection<\/strong><\/p>\n<p>Traffic decapsulation capability allows you to identify and manage traffic from IoT and IoMT protocols, improving the visibility of these devices and enhancing their security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>eyeFocus Identify, quantify and prioritize cybersecurity risk\u00a0and\u00a0compliance Forescout eyeFocus is a comprehensive asset intelligence solution that provides the foundation for understanding the security posture of your attack surface, through risk-based prioritization and persistent asset intelligence. See it in actionread the solution brief \u00a0 Benefits eyeFocus drives greater alignment with compliance frameworks and helps close exposure [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80912,"parent":79725,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-79971","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forescout eyeFocus<\/title>\n<meta name=\"description\" content=\"Enhance you network security posture with risk-based prioritization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/products\/eyefocus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forescout eyeFocus\" \/>\n<meta property=\"og:description\" content=\"Enhance you network security posture with risk-based prioritization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/products\/eyefocus\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T14:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/\",\"url\":\"https:\/\/www.forescout.com\/products\/eyefocus\/\",\"name\":\"Forescout eyeFocus\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"datePublished\":\"2023-07-14T23:04:47+00:00\",\"dateModified\":\"2025-06-09T14:03:10+00:00\",\"description\":\"Enhance you network security posture with risk-based prioritization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/products\/eyefocus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Forescout Cybersecurity Products\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/products\/eyefocus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Platform\",\"item\":\"https:\/\/www.forescout.com\/products\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"eyeFocus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forescout eyeFocus","description":"Enhance you network security posture with risk-based prioritization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/products\/eyefocus\/","og_locale":"en_US","og_type":"article","og_title":"Forescout eyeFocus","og_description":"Enhance you network security posture with risk-based prioritization.","og_url":"https:\/\/www.forescout.com\/products\/eyefocus\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-06-09T14:03:10+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/products\/eyefocus\/","url":"https:\/\/www.forescout.com\/products\/eyefocus\/","name":"Forescout eyeFocus","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","datePublished":"2023-07-14T23:04:47+00:00","dateModified":"2025-06-09T14:03:10+00:00","description":"Enhance you network security posture with risk-based prioritization.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/products\/eyefocus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/products\/eyefocus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/products\/eyefocus\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","width":1200,"height":628,"caption":"Forescout Cybersecurity Products"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/products\/eyefocus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Platform","item":"https:\/\/www.forescout.com\/products\/"},{"@type":"ListItem","position":3,"name":"eyeFocus"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/products-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=79971"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79971\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/79725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80912"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=79971"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=79971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}