Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    464 Ratings
    Company Website
  • Cloudbrink Reviews & Ratings
    28 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,066 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • OpenVPN Reviews & Ratings
    198,253 Ratings
    Company Website
  • Device42 Reviews & Ratings
    173 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    812 Ratings
    Company Website
  • Syncro Reviews & Ratings
    408 Ratings
    Company Website

What is Forescout?

Forescout operates as a comprehensive cybersecurity platform that provides immediate insights, control, and automation to manage risks linked to various devices and networks efficiently. This solution empowers organizations with essential tools to monitor and protect a diverse array of IT, IoT, and operational technology (OT) assets, thereby ensuring robust defense against cyber threats. By leveraging Forescout's Zero Trust methodology along with its integrated threat detection capabilities, enterprises can enforce compliance for their devices, manage secure network access, and sustain continuous monitoring to uncover vulnerabilities. Designed with scalability in mind, Forescout’s platform delivers critical insights that allow organizations to mitigate risks and enhance their security posture across numerous industries, such as healthcare and manufacturing. Furthermore, the holistic approach of Forescout's offerings guarantees that companies are well-equipped to adapt to the constantly changing landscape of cyber threats, maintaining operational integrity and trust with their stakeholders.

What is BK Software?

The swift expansion of the Internet of Things (IoT) presents a more intricate threat environment that demands attention. With an increasing number of connected devices, the importance of establishing strong identities becomes vital to build trust and guarantee that effective security measures are in place. BK offers a secure software solution specifically designed for the generation and management of root keys, enhancing IoT security by allowing manufacturers to create unique identities for their products internally, thus avoiding the costs associated with specialized security hardware. Leveraging SRAM PUF technology, BK emerges as the only solution that provides a hardware entropy source without requiring integration during the silicon manufacturing process. This adaptability enables installation at any stage in the supply chain and even allows for retrofitting on devices that are already in use. As a result, BK paves the way for a groundbreaking method to establish a remote hardware root of trust, which is crucial for scaling the IoT landscape to support billions of devices while preserving security integrity. This transformative capability not only addresses existing IoT security challenges but also sets the stage for future innovations in device security management.

Media

Media

Integrations Supported

Azure Marketplace
CYREBRO
Carbon Black EDR
Check Point Infinity
CyberArk Endpoint Privilege Manager
Cylera Platform
Cynerio
Google Digital Risk Protection
Junos Traffic Vision
Mandiant Managed Defense
Microsoft Defender for IoT
Nexpose
NorthStar Navigator
Optiv Managed XDR
Panaseer
Qualys WAS
Rapid7 InsightConnect
Tenable One
Vectra AI
VirtualArmour

Integrations Supported

Azure Marketplace
CYREBRO
Carbon Black EDR
Check Point Infinity
CyberArk Endpoint Privilege Manager
Cylera Platform
Cynerio
Google Digital Risk Protection
Junos Traffic Vision
Mandiant Managed Defense
Microsoft Defender for IoT
Nexpose
NorthStar Navigator
Optiv Managed XDR
Panaseer
Qualys WAS
Rapid7 InsightConnect
Tenable One
Vectra AI
VirtualArmour

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Forescout Technologies

Date Founded

2000

Company Location

United States

Company Website

www.forescout.com

Company Facts

Organization Name

Intrinsic ID

Date Founded

2008

Company Location

United States

Company Website

www.intrinsic-id.com/products/bk-software/

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

Popular Alternatives

Armis Reviews & Ratings

Armis

Armis Security

Popular Alternatives

Auconet BICS Reviews & Ratings

Auconet BICS

Auconet
Keyfactor EJBCA Reviews & Ratings

Keyfactor EJBCA

Keyfactor
UTunnel VPN and ZTNA Reviews & Ratings

UTunnel VPN and ZTNA

Secubytes LLC