MetaAccess

Trust endpoint access to cloud applications

An employee’s laptop with outdated or misconfigured security software exposes your network to vulnerabilities and malware. Enterprises with remote devices need control and visibility of security policy compliance.

MetaAccess confirms that your devices comply with security policies before accessing cloud applications, like Salesforce and Microsoft 365, while delivering cross-enterprise visibility on a single pane of glass.


Get StartedOPTIONS

Visibility. Control. Compliance.

The proliferation of Bring Your Own Device (BYOD) increases enterprises to exposure. Is the device password protected? Does it have anti-virus software? Are the files encrypted? Has the device been infected by malware? 

MetaAccess solves managing device access to your network and cloud applications. A dashboard provides visibility across the entire enterprise. Flexible controls allow policy modification across the ecosystem down to blocking a single device. APIs provide secure device access control to cloud applications and can integrate directly into your existing and legacy security solutions. 

See how we secure access for the following 

VMWareSalesforce

Highlights

Protect Corporate Data

MetaAccess protects corporate data by ensuring that only compliant devices are allowed to access local networks and cloud applications. In addition, MetaAccess provides enterprise-wide visibility into all managed devices, allowing for easy identification of security and compliance issues as well as detailed device information.

Aid Regulatory Compliance

MetaAccess supports organizations to meet regulatory requirements by preventing access to corporate data, based on device risk. Greater visibility into unmanaged devices is provided by linking user identities to specific devices, whenever accessing cloud applications. MetaAccess further provides reports that can be used to meet regulatory compliance audits, such as FINRA, HIPAA, Sarbanes-Oxley, and others.

Identity Provider Integration

MetaAccess works out-of-the-box with SSO services, like OKTA and Centrify, and offers seamless authentication protocol integration, such as SAML. This gives you the power to manage device access on an application-by-application basis, without requiring any actions by the end user.

Low Setup & Maintenance Costs

Pay-as-you-grow licensing allows you scale easily, when you need to add more devices. Set up only takes a few clicks and does not require technical administration skills. MetaAccess is free for up to 50 devices, providing an extended trial, before committing to a paid subscription.

The MetaAccess Difference

Industry-Leading Endpoint Security

MetaAccess delivers the broadest set of endpoint security checks on the market, including endpoint security application status, patch level, threat detection, and indication of device compromise. It is the only solution offering OPSWAT's patented generic disk encryption detection and network access control, combined with compliance policy check.

Self Remediation

MetaAccess provides out-of-the-box self-remediation and customizable remediation pages that allow users to resolve most issues themselves, reducing help desk calls and support overhead.

BYOD Access Control

MetaAccess addresses the complex BYOD ownership problem by providing the user's identity (IdP or application user name) for each device, when accessing cloud applications. This dramatically increases unmanaged device control, without requiring any IT infrastructure changes, network traffic manipulation, or mobile device management (MDM).

Customizable Policies and APIs

MetaAccess offers comprehensive policy configuration options to customize the solution for specific business needs. REST APIs are provided to enable developers to add cloud access control to their existing security solutions, avoiding the need to develop and maintain proprietary endpoint solutions.

Feature based Tiers

FreeStandardPremium
Device limitUp to 50UnlimitedUnlimited
Endpoint Features
Security Application Compliance Check (Anti-malware, Encryption, etc.)
Operating System Compliance Check (Missing Patches, User passwords, etc.)
Removable Media Control
Potentially Unwanted Applications Check
Vulnerability Assessment
End-User Remediation Page Rebranding
Configurable Endpoint Check Frequency
Disable agent auto-update
Cloud Malware Scanning
Agent Update FrequencyMonthlyWeeklyWeekly
Access Control
Integrate SSO Identity Provider (IdP)Up to 1 IdP Unlimited Unlimited
Protect Cloud ApplicationsUp to 5 Apps Unlimited Unlimited
Access RulesUp to 5 Access Rules Unlimited Unlimited
Cloud API Integration
Webhook
MetaAccess Cloud Integration APIUp to 10 API calls/minuteUp to 20 API calls/minuteCustom
Administration and Reporting
Active Directory Integration
Data Retention1 month12 months12 months or Custom
Email Report FrequencyMonthlyDaily or CustomDaily or Custom
Configurable Report Triggers
Customer SSO User Onboarding
User Role Management
Support/SLA
Customer Support Based on contract Based on contract
SLA Based on contract Based on contract
Built-in support system