NAC or SSL VPN
MetaDefender IT Access easily integrates with third party products such as Network Access Control, IPSEC VPN and SSL VPN, providing advanced compliance and compromised device information which these solutions can utilize to make enforcement actions.
By integrating MetaDefender IT Access into your NAC, SSL/VPN solutions, administrators are able to check remote devices for:
- Vulnerabilities - Detect vulnerabilities on endpoints in installed applications and operating systems.
- Enhanced Compliance - Get greater visibility into the status of installed security applications such as hard disk encryption and system information such as password protection to ensure devices are compliant with existing policies.
- Unwanted Applications - Detect and remove non-compliant or unwanted applications such as peer-to-peer applications from a remote device.
- Advanced Threat Detection - Utilizing two methods of advanced threat detection, MetaDefender IT Access helps identify potential threats that existing anti-malware software might not protect against.
- Portable media scanning and access control - Protect organizations against threats from portable media on the endpoints, a common attack vector for malware.
- Anti-screen capture - Prevent keyloggers and advanced malware from accessing sensitive data.
- Screen capture protection - Prevent unauthorized or accidental screenshots and recording by users, VDI, web collaboration tools, and malicious applications.
Below is a list of product-specific guideline documents on integrating MetaDefender IT Access to a number of different NAC and SSL/VPN products.
MetaDefender IT Access_client-side_integration_guide.pdf
Integrate_Packetfence_with_MetaDefender IT Access.pdf
Integrate_F5 BigIP APM_with_MetaDefender IT Access.pdf
Integrate_Dell_Sonicwall_with_MetaDefender IT Access.pdf
Integrate_Citrix_with_MetaDefender IT Access.pdf
Integrate_Portnox_with_MetaDefender IT Access.pdf
Integrate_Counteract_with_MetaDefender IT Access.pdf
You can set up a MetaDefender IT Access account to manage up to 50 devices with free of charge. Start Trial Now
Notes
- These documents are only guidelines to be used as the starting point of an integration initiative. These guidelines were written in 2015 based on integration work we did in our labs using the current versions of the NAC and SSL/VPN products.
- The documents MetaDefender IT Access is referred to as Gears, which was the name of our product at that time.
- If your devices sit behind a firewall or a proxy, you need to allowlist some domains to make sure UAG and devices able to talk to OPSWAT MetaDefender IT Access. See more details at How do I configure MetaDefender Endpoint to work with a proxy or outbound firewall?