Symantec Secure Access Cloud
This guide shows you how MetaDefender IT-OT Access can be easily and seamlessly integrated into Symantec Secure Access Cloud (TM) to implement Zero Trust Network architecture when accessing any corporate resource deployed in any datacenter (on-premises or in a private or public cloud) from any device. Learn more.
By integrating MetaDefender IT-OT Access to Symantec Secure Access Cloud (TM) , administrators are able to check remote devices for:
- Vulnerabilities - Detect vulnerabilities on endpoints in installed applications and operating systems.
- Enhanced Compliance - Get greater visibility into the status of installed security applications such as hard disk encryption and system information such as password protection to ensure devices are compliant with existing policies.
- Unwanted Applications - Detect and remove non-compliant or unwanted applications such as peer-to-peer applications from a remote device.
- Advanced Threat Detection - Utilizing two methods of advanced threat detection, MetaDefender IT-OT Access helps identify potential threats that existing anti-malware software might not protect against.
- Portable media scanning and access control - Protect organizations against threats from portable media on the endpoints, a common attack vector for malware.
- Anti-screen capture - Prevent keyloggers and advanced malware from accessing sensitive data.
- Screen capture protection - Prevent unauthorized or accidental screenshots and recording by users, VDI, web collaboration tools, and malicious applications.
Documents:
You can set up a MetaDefender IT-OT Access account to manage up to 50 devices with free of charge. Start Trial Now
Notes:
- If your devices sit behind a firewall or a proxy, you need to allowlist domains to make sure devices are able to talk to OPSWAT MetaDefender IT-OT Access cloud. See more details at How do I configure MetaDefender Endpoint to work with a proxy or outbound firewall?
- You need to enable Cross-domain API settings (Settings > Integrations) on your account at the port 11639 and please make sure that there is no application which used the port 11369 on your endpoints.
Was this page helpful?