CounterAct Keeps Endpoints Honest

By Cameron Sturdevant  |  Posted 2006-02-06 Print this article Print

Review: Version 5.1 goes beyond simple worm detection with new rules that determine whether endpoints can connect to internal protected networks, but has significant room for improvement when it comes to detecting rogue wireless access points.

Forescout Technologies CounterAct 5.1 network access control appliance goes beyond simple worm detection with new rules that determine whether endpoints, including many common wireless access points, can connect to internal protected networks.

Click here to read the full review of CounterAct 5.1.

Cameron Sturdevant Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel