OPSWAT announces the launch of MetaAccess - a new way to manage cloud access control

MetaAccess - Cloud Access Control by OPSWAT

Click image to view a larger version

 

Some major challenges for enterprises embracing the cloud include:

  • Guest and contractor programs, BYOD and increases in supply chain partners connecting to the cloud have drastically increased the risk of data breaches caused by risky or non-compliant devices
  • Users keep rapidly adopting unsecured and unsanctioned apps on their devices and imperil organizational compliance
  • There's a spike in malware targeting vulnerable devices as an entry point into cloud applications, significantly increasing the risk of data breaches
  • Legacy approaches to security, and specifically towards Network Access Control (NAC) are becoming obsolete

Cross cloud solutions that combine identity and authentication mechanisms with device posture checks are needed to address this issue.

OPSWAT MetaAccess is a cloud based access control solution that helps organizations manage device access for guest as well as managed devices, as well as enforce endpoint compliance against a predefined security policy. It help in preventing contamination of cloud applications by blocking potentially compromised or non-compliant devices from accessing SaaS applications. MetaAccess is available free for up to 25 devices.

Key features of the product include

  • Wide support for all major enterprise OS's including Windows, Linux, macOS, iOS, and Android
  • Easy integration into with any cloud-based IdP via the support of SAML and OAuth authentication standards
  • Single pane of glass visibility into all devices (corporate owned and unowned) accessing important cloud applications and indications of risk status and top compliance issues
  • Deep device posture checks including a patented encryption detection check and other key security controls across PC and mobile
  • Refined end user notification and awareness building via clear and customizable block and detailed remediation pages, resulting in reduced helpdesk calls

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.