Enterprise Cloud Security 101Learn More
Zero trust access

The MetaAccess Platform

The MetaAccess Platform is a comprehensive solution giving your organization secure network access and deep endpoint compliance. With this one platform approach, you can greatly simplify ongoing management, reducing time, effort and most importantly, risk.

Deep Endpoint Compliance

Extends well beyond standard compliance checks including OS level, security software, encryption, vulnerabilities, and patch management to ensure that your endpoints are secure.

Vulnerability Management Module

Enables the MetaAccess Platform to detect and report vulnerabilities in installed software on the device including 3rd party applications and critical OS security patches.

Patch Management Module

Provides a single development interface to assess thousands of endpoint applications such as Adobe Acrobat, Mozilla Firefox and Zoom Client for vulnerabilities and to auto-patch them

Advanced Endpoint Protection Module

Increase your security posture by leveraging multiple anti-malware engines for hash lookups and file scanning, keystroke and screen capture protection.

VMware VDI Integration

OPSWAT MetaAccess quickly and easily integrates into VMware Horizon Virtual Desktop Infrastructure (VDI), allowing only compliant client devices to connect to corporate resources.

Secure Access Module

Ensures that access from the device to your cloud and legacy applications is secure, whether connecting from the office, home or other remote locations.

“We have a fantastic integration between MetaAccess and the Horizon product.“

Kristina De Nike
Director of Product Management at Horizon, VMware
Challenge

Visibility and Compliance

Security teams face challenges with increasing work from home scenarios, and they lack visibility as well as control over what devices are accessing their network and if they're secure. Adding to the complexity is the myriad point products generally needed to gain this visibility and control.

Access to your environment may come from remote locations, such as work from home, third party locations, and even through sensors associated with Internet of Things (IoT). How can you ensure the access to your network and your organization’s applications are secure? How can you confirm every device in your organization complies with security policies before accessing applications or your network?

Features

Zero-Trust Access

Remote Work Requires Greater Security

Common cybersecurity issues include Advanced Persistent Threats and Distributed Denial of Service (DDoS) attacks. Remote workers are particularly vulnerable to these attacks, and we need a more effective solution than the VPN of old. A Software Defined Perimeter (SDP) increases security without the increased cost or throughput degradation compared to VPN solutions, with a better overall user experience.

Access to Cloud Applications

Access to a cloud application comes from additional security risks. An alternative method for security to cloud applications is also included in the MetaAccess Platform with Cloud application Protection via SAML integration (i.e., Okta, Ping Identity, Other Identity Providers (IdP) support).

MetaAccess addresses the complex bring your own device (BYOD) ownership problem by providing the user's identity (IdP or application username) for each device, when accessing cloud applications. This dramatically increases unmanaged device control without requiring any IT infrastructure changes, network traffic manipulation, or mobile device management (MDM).

Zero-Trust Access On-Prem

It will always be important to ensure zero-trust access and control for on-prem devices. It can be difficult to even know all the devices that are on your network, and to block any unauthorized or non-compliant access. MetaAccess Network Access Control (NAC) gives you this visibility, blocking any unauthorized device, as well as ability to audit, warn, or quarantine any device that is non-compliant with your policies. MetaAccess is available with both agent and agentless solutions, and it can integrate with many 3rd parties to automate threat prevention, enabling enhanced reporting and more granular policies.

Benefits

Single Platform & Flexibility

One Management View

MetaAccess dashboard management provides the visibility and management tools needed from one interface. Organizations can see in total how many devices have accessed the network, whether the access method is with SDP or classic SAML/IdP integration. You also know how many devices are compliant and drill down to specific devices to understand the issue. If executive access is needed right away, select the device and allow access.

Positive End User Experience

It is extremely easy for a user to self-remediate while, at the same time, educating the end-user on the importance of the non-compliant issue. A customizable page will be displayed sharing WHAT the issue is, WHY it’s important, and HOW to resolve in a step-by-step manner. With SDP, an end user will log into their application with SSO the way they always have, whether remote or on-prem, making it easy and comfortable to use.

IT Flexibility & Ease of Management

MetaAccess configuration options give flexibility to ascertain which issues should require blocked access versus notification, and to set personalized thresholds. With each function in our advanced endpoint compliance module, the configuration can be setup to match your organization’s policies.

MetaAccess is available with easy registration and deployable in a matter of hours or days. There is extensive documentation and training, and no third-party services are required. The OPSWAT goal is to unify and simplify the overall experience both for IT and the end user.

MetaAccess Product Guide

MetaAccess Platform (Required)
Deep Endpoint Compliance: 3rd Party Anti-Malware, OS, Encryption and other checks.
Add-on Module - Vulnerability Management
Enables MetaAccess to detect and report vulnerabilities in installed software on the device including 3rd party applications and critical OS security patches
Add-on Module - Patch Management
Enables the MetaAccess Platform to provide a remediation process for required vulnerability patches
Add-on Module: Advanced Endpoint Protection & Anti-Malware
Multi-scanning using more than 20 AV engines
Advanced Malware Protection, Anti-keylogger, Screen Capture Protection, Removable Media Protection, Manage Potentially Unwanted Applications, Block Copy Paste
Add-on Module: Secure Access
Cloud application Protection via SAML integration (i.e. Identity Provider support)
Software Defined Parameter (SDP) - VPN Replacement
Additional Private on-prem SDP Gateways VPN Replacement Gateway

Recommended Resources

Learn How MetaAccess Helps Protect Your Infrastructure