Integration with Third-Party Applications
Our technology can easily be integrated by third-party vendors, such as cloud identity providers (IdPs), cloud access security brokers (CASBs) and traditional network access control (NAC) solutions, to perform security and compliance checks prior to granting access to cloud applications or local network resources. MetaAccess runs on an endpoint and periodically collects endpoint security and posture on the local device and reports back to the MetaAccess cloud. The compliance status of the device is assessed in the cloud against a security policy configured on an administrator console. Third-party solutions can retrieve the device identity from browser cookies, client certificates, or cross-domain APIs and then leverage MetaAccess OAuth API to retrieve the endpoint’s compliance information.