Prevent vulnerable devices from infecting your Cloud Applications
Remote workers, Bring Your Own Device (BYOD) acceptance, and applications hosted in the cloud are making managing and protecting important corporate information harder than ever. OPSWAT makes it easy for you to view and control the devices that access your cloud applications
As enterprise bring your own device (BYOD) programs continue to become more commonplace, 38 percent of companies expect to stop providing devices to workers by 2016, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs.
Example of how MetaAccess integrates with an existing access gateway
Click image to view a larger version
As more and more organizations embrace a Bring Your Own Device Policy, the risk of data breaches grows exponentially. Compromised information can lead to HIPAA, FISMA, and PCI-DSS compliance infractions and hefty fines. IT departments bear most of this burden, and given the continued growth in data breaches, current solutions in the market clearly are not winning the war against advanced attacks. Organizations need new types of cloud security to manage this new reality, but new solutions must also offer an intuitive user experience with native access. OPSWAT's MetaAccess helps organizations that are becoming cloud-enabled with applications such as Office 365, Salesforce, and Dropbox.
- The BYOD user connects to the acces gateway which determines whether the user has the MetaAccess client installed. If not, the user is prompted to download and installs a lightweight client
- The access gateway, having autheticated the user, awaits the result of the endpoint posture check from MetaAccess . Posture check can include the following values "In compliance, Not in compliance, and Unknown endpoint (no client installed)."
- The results of the posture check are used by the access gateway to determine whether the user is granted access