{"id":80009,"date":"2023-07-15T10:13:46","date_gmt":"2023-07-15T17:13:46","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/website-refresh\/network-access-control-copy\/"},"modified":"2025-07-23T11:03:47","modified_gmt":"2025-07-23T15:03:47","slug":"network-security","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/network-security\/","title":{"rendered":"Network Security"},"content":{"rendered":"<h1>Network Security<\/h1>\n<h3>Discover, assess and enforce the compliance of all connected assets.<\/h3>\n<p>Today\u2019s enterprise networks combine traditional IT devices with smart IoT sensors and OT assets that interact with the physical world to generate business value. This growth in connected assets increases the attack surface and creates new network blind spots where cyber risk goes unchecked.<\/p>\n<p>It\u2019s time to rethink your approach. Learn more in our Five Steps to Combating Emerging Threats with Network Security ebook.<\/p>\n<p>Schedule a demo Get ebook<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Where Traditional Network Protection Methods Fall Short<\/h2>\n<h3 class=\"c-stats__numbers\">\n62%<\/h3>\n<p class=\"c-stats__text\">Of organizations don\u2019t have a complete inventory of their IoT\/OT devices.<sup>1<\/sup><\/p>\n<h3 class=\"c-stats__numbers\">\n75%<\/h3>\n<p class=\"c-stats__text\">Of organizations report widening visibility gaps in end-user and IoT assets.<sup>2<\/sup><\/p>\n<h3 class=\"c-stats__numbers\">\n35%<\/h3>\n<p class=\"c-stats__text\">Of organizations had IoT\/OT devices targeted directly or as part of a larger attack.<sup>1<\/sup><\/p>\n<p>It\u2019s not uncommon for organizations to have multiple asset inventories in their ecosystem of IT and security tools. But even when combined through lengthy manual effort, they rarely cover the entire attack surface due to their overlapping coverage of managed assets.<\/p>\n<p>Many organizations rely on traditional software agents to monitor and protect the endpoints on their networks. But smart IoT sensors and industrial process controllers can\u2019t support agents, creating blind spots that are targeted by attackers.<\/p>\n<p>Waiting on scheduled scans to sweep the network for rogue or at-risk devices allows attackers to infiltrate without being noticed. Some forms of active scanning can even disrupt OT assets that monitor or control critical business processes causing financial, reputational, and even physical harm.<\/p>\n<p><a href=\"\/webinars\/5-steps-to-combating-emerging-threats-with-network-security\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/12\/Webinar-Feature-5-Steps-Net-Sec-v1-1200x628-1.webp\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">5 Steps to Combating Emerging Threats with Network Security<\/h2>\n<p>Join Forescout\u2019s Solutions Marketing Manager, Joe Thibault, in a webinar tackling evolving cyber threats. Thibault covers key strategies, including enhancing asset discovery, post-connect access control, battling ransomware, overcoming team burnout, and implementing automated controls.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/webinars\/5-steps-to-combating-emerging-threats-with-network-security\/\" title=\"Watch Webinar\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-camera icon-position-right has-icon-animation icon-animation-fade-in\">Watch Webinar<\/a><\/p>\n<h2 class=\"c-title\">What Does ModernNetwork Security Look Like?<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/continuous-blue-round-icon.svg\" style=\"width:55%\" alt=\"Compound conditions and actions\" loading=\"lazy\"><\/p>\n<h3>Continuous Compliance Assessment<\/h3>\n<p>Assess the security posture and compliance of every managed and unmanaged asset in real-time without installing software agents, and even fix missing, broken, or out-of-date security agents among your existing ecosystem of tools.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/device-compliance\/\" title=\"learn more\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Modern-net-blue-round-icon.svg\" style=\"width:55%\" alt=\"Real-Time &amp; Continuous\" loading=\"lazy\"><\/p>\n<h3>Modern Network Access Control<\/h3>\n<p>Continuously monitor all connected assets across heterogenous networks for noncompliance or unusual behavior and govern access to the enterprise-wide network infrastructure, through flexible and dynamic network access policies.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-access-control\/\" title=\"learn more\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Dynamic-blue-round-icon.svg\" style=\"width:55%\" alt=\"Vendor &amp; Device Agnostic\" loading=\"lazy\"><\/p>\n<h3>Dynamic Segmentation Management<\/h3>\n<p>Visualize traffic flows between groups of assets and design dynamic segmentation policies that enforce least privilege access to shrink the attack surface without impacting your operations.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-segmentation\/\" title=\"learn more\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/automate-blue-round-icon.svg\" style=\"width:55%\" alt=\"manually initiated control actions\" loading=\"lazy\"><\/p>\n<h3>Automate Cybersecurity Workflows<\/h3>\n<p>Share asset identity, configuration and security details with your existing ecosystem of security and management systems to automate workflows across disparate tools, accelerating system-wide response to risks and threats.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/security-automation\/\" title=\"learn more\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<h2 style=\"color: #009dea;text-align: center\">Customer Success with Forescout Zero Trust Access and Control<\/h2>\n<p><button class=\"slider-navigation\" data-corresponding-slide=\"0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2021\/06\/TDOT-logo-1.png\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"1\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/rcbc-logo-500x200-1.png\" loading=\"lazy\"><\/button><button class=\"slider-navigation\" data-corresponding-slide=\"2\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/04\/utah-seal.png\" alt=\"The great seal of the state of Utah\" loading=\"lazy\"><\/button><\/p>\n<figure>\n<blockquote>\n<p>\u201cThe quality and breadth of data the Forescout 4D Platform<sup>\u2122<\/sup> provided and all the use cases it could address, from device compliance and detection of rogue devices to asset management and incident response, impressed us all. Plus, we would no longer have to wait on other people to gain visibility or control.\u201d<\/p>\n<\/blockquote><figcaption>Richard White<br \/>\nCybersecurity Architect<br \/>\nTennessee Department of Transportation<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/forescout-case-study-tdot\/\" title=\"read more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">read more<\/a><\/p>\n<figure>\n<blockquote>\n<p>\u201cThere will always be cyberthreats. We needed a way to manage the risk, starting with automatically enforcing compliance, followed by implementing robust network access control.\u201d<\/p>\n<\/blockquote><figcaption>Jed Lumain<br \/>\nChief Technology Officer<br \/>\nRizal Commercial Banking Corporation<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/rcbc-case-study\/\" title=\"read more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">read more<\/a><\/p>\n<figure>\n<blockquote>\n<p>\u201cIn addition to being vendor agnostic, the Forescout solution is quick and easy to implement and provides outstanding visibility, compliance and classification capabilities in real time. Plus it integrates easily with other systems in our organization making them more effective and efficient.\u201d<\/p>\n<\/blockquote><figcaption>Phil Bates<br \/>\nChief Information Security Officer<br \/>\nState of Utah<br \/>\n<\/figcaption><\/figure>\n<p><a href=\"\/resources\/state-of-utah\/\" title=\"read more\" class=\"c-btn c-btn--primary-dark c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-fade-in\">read more<\/a><\/p>\n<p>Previous<br \/>\nNext\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/man-behind-laptop-in-front-of-server.webp\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">The Foundation for a Zero Trust Architecture<\/h2>\n<p>A zero trust architecture (ZTA) is a security design approach, not a single-vendor solution. Forescout can help you adopt a NIST SP 800-207-based ZTA within your existing multi-vendor environment, from identifying, monitoring and controlling connected assets to orchestrating enforcement and remediation. Start your zero trust journey without needing to rip and replace your existing infrastructure or security controls. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\" title=\"learn more\" class=\"c-btn c-btn--primary c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">learn more<\/a><\/p>\n<h2 class=\"c-title\">Related Use Cases<\/h2>\n<p><a href=\"\/solutions\/network-access-control\/\" title=\"Network Access Control (NAC)\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Related-NAC.png\" loading=\"lazy\"><\/a><\/p>\n<h3>Network Access Control<\/h3>\n<p><a href=\"\/solutions\/network-access-control\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"\/solutions\/iot-security\/\" title=\"IoT Security\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Related-OT-Sec.png\" alt=\"OT Security\" loading=\"lazy\"><\/a><\/p>\n<h3>OT Security<\/h3>\n<p><a href=\"\/solutions\/iot-security\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"\/solutions\/zero-trust\/\" title=\"Zero Trust\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Related-Zero-Trust.png\" loading=\"lazy\"><\/a><\/p>\n<h3>Zero Trust<\/h3>\n<p><a href=\"\/solutions\/zero-trust\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/medical-device-security\/\" title=\"Medical Device Security\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Related-Medical-Device-Security.png\" alt=\"Medical Device Security\" loading=\"lazy\"><\/a><\/p>\n<h3>Medical Device Security<\/h3>\n<p><a href=\"\/solutions\/medical-device-security\/\" title=\"explore\" class=\"c-read-more u-mt-auto cta-link\">explore<\/a><\/p>\n<p style=\"font-size: 60%;text-align: left\"><sup>1<\/sup> The State of IoT\/OT Cybersecurity in the Enterprise \u2013 Ponemon Institute<br \/>\n<sup>2<\/sup> Cybersecurity Asset Management Trends 2021 \u2013 Enterprise Strategy Group\n","protected":false},"excerpt":{"rendered":"<p>Network Security Discover, assess and enforce the compliance of all connected assets. Today\u2019s enterprise networks combine traditional IT devices with smart IoT sensors and OT assets that interact with the physical world to generate business value. This growth in connected assets increases the attack surface and creates new network blind spots where cyber risk goes [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80913,"parent":80153,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-80009","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Software Tools &amp; Solutions<\/title>\n<meta name=\"description\" content=\"Go beyond authentication. Forescout&#039;s network security software solutions assess security posture and enforce compliance for all connected assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Software Tools &amp; Solutions\" \/>\n<meta property=\"og:description\" content=\"Go beyond authentication. Forescout&#039;s network security software solutions assess security posture and enforce compliance for all connected assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T15:03:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/network-security\/\",\"name\":\"Network Security Software Tools & Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"datePublished\":\"2023-07-15T17:13:46+00:00\",\"dateModified\":\"2025-07-23T15:03:47+00:00\",\"description\":\"Go beyond authentication. Forescout's network security software solutions assess security posture and enforce compliance for all connected assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/www.forescout.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Software Tools & Solutions","description":"Go beyond authentication. Forescout's network security software solutions assess security posture and enforce compliance for all connected assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/network-security\/","og_locale":"en_US","og_type":"article","og_title":"Network Security Software Tools & Solutions","og_description":"Go beyond authentication. Forescout's network security software solutions assess security posture and enforce compliance for all connected assets.","og_url":"https:\/\/www.forescout.com\/solutions\/network-security\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-07-23T15:03:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/network-security\/","url":"https:\/\/www.forescout.com\/solutions\/network-security\/","name":"Network Security Software Tools & Solutions","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","datePublished":"2023-07-15T17:13:46+00:00","dateModified":"2025-07-23T15:03:47+00:00","description":"Go beyond authentication. Forescout's network security software solutions assess security posture and enforce compliance for all connected assets.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/network-security\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.forescout.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=80009"}],"version-history":[{"count":1,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80009\/revisions"}],"predecessor-version":[{"id":107435,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80009\/revisions\/107435"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80913"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=80009"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=80009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}