Zero-Trust Access (ZTA), an approach that considers all entities untrusted by default, is rapidly becoming the industry standard and being mandated by regulatory bodies including governments. Leveraging the latest ZTA technologies, OPSWAT’s MetaAccess Zero-Trust Access Platform is a unified platform cloud solution for providing deep endpoint compliance, advanced endpoint protection, identity authorization, and secure access without hindering workflows.
MetaAccess delivers security compliance, visibility, and control to every device and user accessing enterprise resources. Based upon the Software Defined Perimeter Technology (SDP), it examines devices to make sure that they are secure, with the required security controls installed. It then goes much deeper by doing the most comprehensive device posture check in the industry.
The MetaAccess Vulnerability Management Module enables the MetaAccess Platform to detect and report vulnerabilities in installed software on the device including 3rd party applications and critical OS security patches. MetaAccess detects more than 27,000 CVEs and displays the Known Exploited Vulnerabilities (KEV) as posted by CISA that are relevant to the specific endpoint. The MetaAccess Patch Management module enables the MetaAccess Platform to provide a remediation process for required vulnerability patches. MetaAccess detects vulnerabilities on more than 700 third party applications, auto-patching more than 150 of these.
On the security side, MetaAccess provides removable media protection and executes a multi-scan of more than 20 Anti-Virus engines as well as protects against keyloggers, screen capture and copy and paste. Only once MetaAccess has ensured that the endpoint device is both compliant and secure, will the user be authorized through an integrated IAM (identity authorization management) solution and be given access to corporate resources based on a policy of least-privilege access, that is only to those resources to which the user is entitled.
Seller
OPSWATLanguages Supported
English
Product Description
MetaAccess is an advanced endpoint compliance and security platform designed to prevent non-compliant or potentially compromised devices from accessing local networks and cloud applications such as Office 365, Salesforce, and Dropbox. By enforcing security policies and ensuring device compliance, MetaAccess safeguards corporate data and enhances overall network security.
Key Features and Functionality:
- Endpoint Compliance: Detects, classifies, and manages over 5,000 security applications, ensuring devices adhere to organizational security standards.
- Application Removal: Silently removes thousands of unauthorized applications, including toolbars and public sharing software, to maintain a secure environment.
- Endpoint Vulnerability Assessment: Identifies vulnerabilities in over 20,000 applications and can block device access if critical issues are detected.
- Malware Detection: Performs quick memory scans or full file system scans to uncover persistent threats, utilizing local antimalware log analysis.
- Data Protection: Safeguards against data breaches by controlling removable media usage and blocking keystroke and screen logging activities.
Primary Value and Problem Solved:
MetaAccess addresses the challenges posed by the proliferation of Bring Your Own Device (BYOD policies and remote work environments, which increase the risk of unauthorized or insecure devices accessing corporate resources. By providing comprehensive visibility and control over all devices attempting to connect to the network, MetaAccess ensures that only compliant devices gain access. This proactive approach minimizes security vulnerabilities, prevents potential data breaches, and helps organizations meet regulatory compliance requirements. Additionally, MetaAccess offers self-remediation capabilities, allowing users to resolve compliance issues independently, thereby reducing the burden on IT support teams.
Overview by
Jody Wilson