Secure Access

Endpoint security and compliance for cloud applications and networks

MetaAccess Client SDK with OESIS Released for OEMs

August 14, 2018 by Yiyi Miao
We are excited to announce the release of the MetaAccess Client SDK for OEMs. The MetaAccess Client SDK can now be used to deploy both MetaAccess and OESIS Framework with the added benefits of automatic updates, version control and...

Blazing a New Trail at Dreamforce 2017

November 16, 2017
Over 170,000 people attended the 2017 edition of Dreamforce, one of the largest technology conferences in the world. OPSWAT was there to present MetaAccess and rub elbows with the innovators who attend Dreamforce each year. With...

There's a New SaaS in Town: OPSWAT at Dreamforce 2017

October 31, 2017
At Dreamforce this year, OPSWAT will look to show companies how they can put a cyber security moat around their SaaS applications with MetaAccess. MetaAccess is our new cloud security solution that enforces compliance,...

7 Essential GDPR Requirements to Know

October 20, 2017 by Yiyi Miao
Starting on May 25th, 2018, all companies that do not comply with the GDPR will be faced with heavy fines. But what is the GDPR?

OPSWAT Unveils New Offering for Device Security and Access Control for SaaS Application Use

October 17, 2017
OPSWAT today announced the immediate availability of MetaAccess, a cloud security solution facilitating an enterprise's move to the cloud with deeper security checks around managed and unmanaged endpoints. Specifically, MetaAccess...

Endpoint Management: Discover Unknown Devices and Monitor Patches

April 22, 2016 by Yiyi Miao
Knowing what endpoints are operating within your network is one thing, but knowing what your endpoints are operating on is another. IT administrators need an easy, automated way to detect new devices entering their network, and a way to...

Busted: 3 Myths about Endpoint Visibility

November 11, 2015 by Yiyi Miao
Maintaining endpoint visibility with or without client agents is fundamental to any network or information security architecture. Regardless of processes, programs, or the number of devices and people, being able to monitor the endpoints...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.