Secure Access

Endpoint security and compliance for cloud applications and networks

6 Reasons Why Traditional Network Access Control Is Dead

December 21, 2017 by Yiyi Miao
In the mid-2000s, network access control (NAC) became the accepted solution for on-premises networks. NAC restricted access for devices that did not comply with company policy or had become infected with malware. NAC developed for...

Blazing a New Trail at Dreamforce 2017

November 16, 2017
Over 170,000 people attended the 2017 edition of Dreamforce, one of the largest technology conferences in the world. OPSWAT was there to present MetaAccess and rub elbows with the innovators who attend Dreamforce each year. With...

There's a New SaaS in Town: OPSWAT at Dreamforce 2017

October 31, 2017
At Dreamforce this year, OPSWAT will look to show companies how they can put a cyber security moat around their SaaS applications with MetaAccess. MetaAccess is our new cloud security solution that enforces compliance,...

7 Essential GDPR Requirements to Know

October 20, 2017 by Yiyi Miao
What is the GDPR? Simply put, the GDPR is data protection for citizens of the European Union. Noncompliant organizations will face fines of up to 4% of a company's annual revenue or 20 million, whichever is larger. The GDPR takes...

OPSWAT Unveils New Offering for Device Security and Access Control for SaaS Application Use

October 17, 2017
OPSWAT today announced the immediate availability of MetaAccess, a cloud security solution facilitating an enterprise's move to the cloud with deeper security checks around managed and unmanaged endpoints. Specifically, MetaAccess...

Endpoint Management: Discover Unknown Devices and Monitor Patches

April 22, 2016 by Yiyi Miao
Knowing what endpoints are operating within your network is one thing, but knowing what your endpoints are operating on is another. IT administrators need an easy, automated way to detect new devices entering their network, and a way to...

Busted: 3 Myths about Endpoint Visibility

November 10, 2015 by Doug Rangi
Maintaining endpoint visibility with or without client agents is fundamental to any network or information security architecture. Regardless of processes, programs, or the number of devices and people, being able to monitor the endpoints...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.