{"id":80153,"date":"2023-07-18T07:30:18","date_gmt":"2023-07-18T14:30:18","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/archive\/solutions-copy\/"},"modified":"2024-05-07T06:30:50","modified_gmt":"2024-05-07T13:30:50","slug":"solutions","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/solutions\/","title":{"rendered":"Solutions"},"content":{"rendered":"<h1>Solutions<\/h1>\n<p>\u00a0<\/p>\n<h3>The attack surface is growing. So is Forescout.<\/h3>\n<p>Our leading network security solutions for cyber asset management, network access control, segmentation management, and OT\/ICS and IoMT security are now part of a broader portfolio that encompasses risk and exposure management and threat detection and response \u2013 all on a single, scalable, vendor-agnostic platform.<\/p>\n<p>\u00a0<\/p>\n<p>Schedule a demo <\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Solutions by Challenge<\/h2>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/risk-and-exposure-management\/\" title=\"Risk and Exposure Management (solution)\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/REM-icon-color.svg\" style=\"width:35%\" alt=\"Risk and Exposure Management\" loading=\"lazy\"><\/a><\/p>\n<h3>Risk &amp; Exposure Management<\/h3>\n<p>Identify, quantify and prioritize cybersecurity risk and compliance<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align:left;height:auto\">\n<li>Cyber asset management<\/li>\n<li>Visibility &amp; compliance<\/li>\n<li>Risk prioritization<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/risk-and-exposure-management\/\" title=\"explore\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\">explore<br \/>\n<\/a>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-security\/\" title=\"Network Security\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Network-Security-icon-color.svg\" style=\"width:35%\" alt=\"Network Security\" loading=\"lazy\"><\/a><\/p>\n<h3>Network<br \/>\nSecurity<\/h3>\n<p>Assess, segment and enforce with proactive and reactive controls<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align: left;height:auto\">\n<li>Network asset control<\/li>\n<li>Risk &amp; threat containment<\/li>\n<li>Segmentation management<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-security\/\" title=\"explore\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">explore<br \/>\n<\/a>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/threat-detection-and-response\/\" title=\"Threat Detection and Response\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/XDR-icon-color.svg\" style=\"width:35%\" alt=\"Threat Detection and Response\" loading=\"lazy\"><\/a><\/p>\n<h3>Threat Detection &amp; Response<\/h3>\n<p>Detect, investigate and respond to true threats and incidents<\/p>\n<ul class=\"c-list--primary c-list--triangle\" style=\"text-align:left;height:auto\">\n<li>True threat correlation<\/li>\n<li>Optimized security operations<\/li>\n<li>SecOps visibility<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/threat-detection-and-response\/\" title=\"explore\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">explore<br \/>\n<\/a>\n<h2 class=\"c-title\">The Forescout Advantage<\/h2>\n<p>The only automated cybersecurity company that continuously identifies, protects and ensures the compliance of all managed and unmanaged assets \u2013 IT, IoT, IoMT and OT \u2013 so you can more effectively manage cyber risk and mitigate threats.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/vendor-agnostic-round-blue-icon-1.svg\" style=\"width:40%\" alt=\"Vendor Agnostic\" loading=\"lazy\"><\/p>\n<h4>Vendor &amp; Device Agnostic<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/real-time-round-blue-icon.svg\" style=\"width:40%\" alt=\"Real-Time and Continuous Cybersecurity\" loading=\"lazy\"><\/p>\n<h4>Real-Time &amp; Continuous<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/managed-round-blue-icon.svg\" style=\"width:40%\" alt=\"Managed and Unmanaged Cyber Assets\" loading=\"lazy\"><\/p>\n<h4>Managed &amp; Unmanaged Cyber Assets<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Flexible-round-blue-icon.svg\" style=\"width:40%\" alt=\"Flexible Deployment\" loading=\"lazy\"><\/p>\n<h4>Flexible Deployment<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Converged-round-blue-icon.svg\" style=\"width:40%\" alt=\"Converged Platform\" loading=\"lazy\"><\/p>\n<h4>Converged Platform<\/h4>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/proven-round-blue-icon.svg\" style=\"width:40%\" alt=\"Proven at Scale\" loading=\"lazy\"><\/p>\n<h4>Proven at Scale<\/h4>\n<p><a href=\"https:\/\/www.forescout.com\/products\/\" title=\"explore the forescout platform\" class=\"c-btn c-btn--white c-btn--outline has-icon icon-compass icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\" rel=\"noopener\">explore the forescout platform<br \/>\n<\/a>\n<p><a href=\"#tab0\" class=\"c-tabs__link js-tabs-link\"><br \/>\nSolutions by Use Case\n<p><\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/nac-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Network Access Control<\/h3>\n<p>Our platform continuously identifies all connected assets, assesses their posture and compliance and enforces zero trust access policies across heterogeneous networks.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-access-control\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/network-seg-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Network Segmentation<\/h3>\n<p>The Forescout Platform bridges disparate enforcement technologies to accelerate design and deployment of dynamic network segmentation without causing disruption.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/network-segmentation\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/Asset-Inventory-Icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Asset Inventory<\/h3>\n<p>The Forescout Platform provides a real-time inventory and in-depth device context of all connected assets, enabling you to make intelligent security and business decisions.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/asset-inventory\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/zero-trust-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Zero Trust<\/h3>\n<p>The Forescout Platform provides comprehensive asset visibility, network segmentation, continuous monitoring and automated control enforcement to help you implement zero trust security.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/zero-trust\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/otsec-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">OT Security<\/h3>\n<p>We provide in-depth OT\/ICS network visibility, real-time threat detection and cyber risk mitigation to help ensure safety, operational efficiency and uptime.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/ot-security\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/iot-sec-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">IoT Security<\/h3>\n<p>The Forescout Platform automates the discovery, assessment and control of every connected device, including vulnerable IoT assets that are increasingly exploited to gain network access.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/iot-security\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/medical-device-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Medical Device Security<\/h3>\n<p>The Forescout Platform delivers continuous, real-time discovery of every connected medical device and assesses its risk, factoring in known exposures, attack potential and criticality.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/security-automation\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/siem-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">SIEM Modernization<\/h3>\n<p>Forescout Threat Detection &amp; Response offers a phased approach to SIEM modernization for SOC teams frustrated by legacy SIEMs that cost too much for log storage, are hard to configure and produce too many alerts based on false positives.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/siem-modernization\/\" title=\"explore\" class=\"c-read-more\">explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Compliance-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Device Compliance<\/h3>\n<p>Forescout enables you to continuously assess the security hygiene and compliance state of all connected assets and automate remediation workflows to mitigate device decay.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/device-compliance\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><a href=\"#tab1\" class=\"c-tabs__link js-tabs-link\"><br \/>\nSolutions by Industry\n<p><\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/financial-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Financial Services<\/h3>\n<p>Forescout helps you comply with rigorous standards and secure complex environments at scale with agentless device visibility, continuous monitoring and automated policy-based control enforcement. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/financial-services\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/government-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Government<\/h3>\n<p>Forescout helps government IT and security professionals protect sensitive information, secure access to resources and demonstrate compliance through continuous monitoring and automated risk mitigation. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/government\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/healthcare-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Healthcare<\/h3>\n<p>Forescout helps you safely expand network access to clinicians, caregivers, research organizations and contractors while securely embracing agentless medical devices, IoMT and IoT.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/healthcare\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/power-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Power &amp; Utilities<\/h3>\n<p>Forescout helps you protect critical infrastructure from cyberthreats, mitigate operational risks to reduce downtime and demonstrate compliance with NERC CIP. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/power-utilities\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/oil-gas-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Oil &amp; Gas<\/h3>\n<p>Forescout provides complete visibility and automated risk mitigation in OT\/ICS networks to ensure safety, improve uptime and enforce compliance with the NIST Cybersecurity Framework and IEC 64223.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/oil-gas\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/manufacturing-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Manufacturing<\/h3>\n<p>Forescout provides comprehensive asset visibility, risk mitigation and policy compliance across OT, IoT and IT networks to help increase manufacturing efficiency, automation and uptime. <\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/manufacturing\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/07\/Education-icon-72x72-1.svg\" loading=\"lazy\"><\/p>\n<h3 class=\"c-title-small u-mt-s\">Education<\/h3>\n<p>Forescout makes it possible for students and faculty to connect via a vast array of devices by enforcing least-privilege access based on identity, device type and security hygiene.<\/p>\n<p><a href=\"https:\/\/www.forescout.com\/solutions\/education\/\" title=\"Explore\" class=\"c-read-more\">Explore<\/a><\/p>\n<h2 class=\"c-title\">Customer Confidence<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/nhs-logo-401x238-1.png\" class=\"u-size-full\" alt=\"National Health Service (NHS) Fife\" loading=\"lazy\"><\/p>\n<blockquote class=\"c-clients-carousel__quote\">\n<p>\u201cWith the Forescout Platform, we now have, in a single solution, the device visibility and automated control capabilities that will allow us to more effectively manage cyber, operational and compliance risks.\u201d <\/p>\n<p><b class=\"c-clients-carousel__source\">\u2014 Allan Young, Head of IT Operations National Health Service (NHS) Fife<\/b>\n\n<\/blockquote>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/nhs-fife-case-study\/\" title=\"Learn More\" class=\"c-read-more\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/utah-state-logo-500x200-1.png\" class=\"u-size-full\" alt=\"State of Utah\" loading=\"lazy\"><\/p>\n<blockquote class=\"c-clients-carousel__quote\">\n<p>\u201cIn addition to being vendor agnostic, the Forescout solution is quick and easy to implement and provides outstanding visibility, compliance and classification capabilities in real time. Plus it integrates easily with other systems in our organization making them more effective and efficient.\u201d<\/p>\n<p><b class=\"c-clients-carousel__source\">\u2014 Phil Bates, Chief Information Security Officer for the State of Utah<\/b>\n\n<\/blockquote>\n<p><a href=\"\/resources\/state-of-utah\/\" title=\"learn more\" class=\"c-read-more\" target=\"_blank\" rel=\"noopener\">learn more<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/mobility-ado-logo-500x200-1.png\" class=\"u-size-full\" alt=\"Mobility ADO\" loading=\"lazy\"><\/p>\n<blockquote class=\"c-clients-carousel__quote\">\n<p>\u201cIn short, Forescout is the front line of our active defense. It gives us the information we need to make smart decisions about security as well as infrastructure and operations.\u201d<\/p>\n<p><b class=\"c-clients-carousel__source\">\u2014 Hector Mendez, Chief Security Officer, Mobility ADO<\/b>\n\n<\/blockquote>\n<p><a href=\"https:\/\/www.forescout.com\/resources\/mobility-ado\/\" title=\"Learn More\" class=\"c-read-more\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2022\/06\/nhs-logo-401x238-1.png\" alt=\"National Health Service (NHS) Fife\" loading=\"lazy\"><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/05\/utah-state-logo-500x200-1.png\" alt=\"State of Utah\" loading=\"lazy\"><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/mobility-ado-logo-500x200-1.png\" alt=\"Mobility ADO\" loading=\"lazy\"><\/p>\n<p><a href=\"https:\/\/www.forescout.com\/success-stories\/\" title=\"See All Success Stories\" class=\"c-btn c-btn--gray c-btn--outline has-icon icon-quote icon-position-right has-icon-animation icon-animation-pulse\">See All Success Stories<br \/>\n<\/a>\n","protected":false},"excerpt":{"rendered":"<p>Solutions \u00a0 The attack surface is growing. So is Forescout. Our leading network security solutions for cyber asset management, network access control, segmentation management, and OT\/ICS and IoMT security are now part of a broader portfolio that encompasses risk and exposure management and threat detection and response \u2013 all on a single, scalable, vendor-agnostic platform. [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":80913,"parent":0,"menu_order":150,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-80153","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Solutions - Forescout<\/title>\n<meta name=\"description\" content=\"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solutions - Forescout\" \/>\n<meta property=\"og:description\" content=\"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T13:30:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/\",\"url\":\"https:\/\/www.forescout.com\/solutions\/\",\"name\":\"Solutions - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"datePublished\":\"2023-07-18T14:30:18+00:00\",\"dateModified\":\"2024-05-07T13:30:50+00:00\",\"description\":\"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solutions - Forescout","description":"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/solutions\/","og_locale":"en_US","og_type":"article","og_title":"Solutions - Forescout","og_description":"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.","og_url":"https:\/\/www.forescout.com\/solutions\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-05-07T13:30:50+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/solutions\/","url":"https:\/\/www.forescout.com\/solutions\/","name":"Solutions - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","datePublished":"2023-07-18T14:30:18+00:00","dateModified":"2024-05-07T13:30:50+00:00","description":"Our leading solutions for network security, risk management, and threat detection and response \u2013 all on a single scalable platform.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/solutions\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/04\/solution-featured-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=80153"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/80153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/80913"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=80153"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=80153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}