Security Experts:

Connect with us

Hi, what are you looking for?


Cybersecurity Funding

ForeScout Raises $76 Million at $1 Billion Valuation

Device security firm ForeScout Technologies said on Thursday that it has secured $76 million in additional funding that values the company at a cool $1 billion.

Device security firm ForeScout Technologies said on Thursday that it has secured $76 million in additional funding that values the company at a cool $1 billion.

The late stage funding round, led by Wellington Management Company, comes as the company broke $125 million in revenue in fiscal year 2015, and tripled its valuation over the past 18 months.

The company, which historically has focused on traditional enterprise endpoint protection, has an eye on expanding its expertise in the Internet of Things (IoT) security space, and will be putting some of the new cash to work through increased spending on R&D for its IoT security efforts.

ForeScout Logo“It took 25 years for the world to get to 5 billion connected devices, but with the explosion of the IoT we’ll see around 30 billion by 2020 — an entirely new approach to security is required,” said Michael DeCesare, ForeScout CEO and President.

ForeScout’s flagship product, ForeScout CounterACT, provides real-time network visibility into users, devices including BYOD, systems and applications. The platform helps IT organizations better understand their security posture and automate responses to a wide variety of security issues.

Additionally, CounterACT allows other security products to exchange information and mitigate exposures. More than 70 partners, including FireEye, Damballa, Bromium, Splunk, and Qualys, integrate with CounterACT for interconnected security. For example, through an integration partnership with Damballa, customers can automatically quarantine or log devices deemed ‘infected’ by Damballa.  

The company currently has more than 2,000 customers in over 60 countries using their network security and compliance posture solutions.

“Device proliferation and IoT deployments are easy entrances for cyber criminals if not detected and protected. With agentless visibility, intuitive automated controls and a commitment to integrating with leading security and IT management solutions, ForeScout is well-positioned to own the burgeoning IoT security market,” said DeCesare, a former Intel Security executive,  who took the role of CEO in February 2015.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek


Twenty-one cybersecurity-related M&A deals were announced in December 2022.


Forty cybersecurity-related M&A deals were announced in January 2023.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.