Trust endpoint access to cloud applications
An employee’s laptop with outdated or misconfigured security software exposes your network to vulnerabilities and malware. Enterprises with remote devices need control and visibility of security policy compliance.
MetaAccess confirms that your devices comply with security policies before accessing cloud applications, like Salesforce and Microsoft 365, while delivering cross-enterprise visibility on a single pane of glass.
The proliferation of Bring Your Own Device (BYOD) increases enterprises to exposure. Is the device password protected? Does it have anti-virus software? Are the files encrypted? Has the device been infected by malware?
MetaAccess solves managing device access to your network and cloud applications. A dashboard provides visibility across the entire enterprise. Flexible controls allow policy modification across the ecosystem down to blocking a single device. APIs provide secure device access control to cloud applications and can integrate directly into your existing and legacy security solutions.
MetaAccess delivers security, visibility, and control to every device accessing your network and cloud applications.
MetaAccess protects corporate data by ensuring that only compliant devices are allowed to access local networks and cloud applications. In addition, MetaAccess provides enterprise-wide visibility into all managed devices, allowing for easy identification of security and compliance issues as well as detailed device information.
MetaAccess supports organizations to meet regulatory requirements by preventing access to corporate data, based on device risk. Greater visibility into unmanaged devices is provided by linking user identities to specific devices, whenever accessing cloud applications. MetaAccess further provides reports that can be used to meet regulatory compliance audits, such as FINRA, HIPAA, Sarbanes-Oxley, and others.
MetaAccess works out-of-the-box with SSO services, like OKTA and Centrify, and offers seamless authentication protocol integration, such as SAML. This gives you the power to manage device access on an application-by-application basis, without requiring any actions by the end user.
Pay-as-you-grow licensing allows you scale easily, when you need to add more devices. Set up only takes a few clicks and does not require technical administration skills. MetaAccess is free for up to 50 devices, providing an extended trial, before committing to a paid subscription.
MetaAccess delivers the broadest set of endpoint security checks on the market, including endpoint security application status, patch level, threat detection, and indication of device compromise. It is the only solution offering OPSWAT’s patented generic disk encryption detection and network access control, combined with compliance policy check.
MetaAccess provides out-of-the-box self-remediation and customizable remediation pages that allow users to resolve most issues themselves, reducing help desk calls and support overhead.
MetaAccess addresses the complex BYOD ownership problem by providing the user’s identity (IdP or application user name) for each device, when accessing cloud applications. This dramatically increases unmanaged device control, without requiring any IT infrastructure changes, network traffic manipulation, or mobile device management (MDM).
MetaAccess offers comprehensive policy configuration options to customize the solution for specific business needs. REST APIs are provided to enable developers to add cloud access control to their existing security solutions, avoiding the need to develop and maintain proprietary endpoint solutions.
Monitor hard drive and storage encryption, with our patented encryption detection technology. Report if a system volume is not encrypted by an approved application.
Ensure anti-malware device compliance by verifying the authenticity, active status, and proper configuration of 5000+ supported anti-malware applications.
Detect infected endpoints and improve zero-day threat detection, by utilizing the power of multiscanning, with 30+ anti-malware engines, and analyzing the local anti-malware threat log for repeated infections.
Check whether the device operating system is up to date and patched, by retrieving status from multiple supported patch management applications.
Using a scoring system based on OPSWAT and CVSS scores, MetaAccess can block access to devices that have applications installed with critical vulnerabilities, as well as provide remediation instructions.
Make certain that the portable media including USB, memory card, CDs, DVDs, SIM cards, flash drives and smart phones are allowed or disallowed endpoint connection. Furthermore, ensure the security of displayed data and keyboard entries
Detect whether adequate user authentication and lock screen timeouts are set, in order to aid compliance and minimize the risk of data theft.
The MetaAccess CleanUp module can detect, remediate, and clean up applications and files that cause security risks and use excessive memory.
Trust at the point of entry
Anytime portable media accesses secure environments, critical infrastructure risks exposure. Software updates, reporting, and audits all require external data sources.
MetaDefender Kiosk acts as a digital security guard—inspecting all media for malware, vulnerabilities, and sensitive data.
Trust at the point of entry
MetaDefender Kiosk accepts multiple form factors, including CD/DVD, 3.5″ diskettes, flash memory cards, mobile devices, and USBs—even when encrypted.
Once inserted, MetaDefender Kiosk immediately scans for malware, vulnerabilities, and sensitive data. Suspicious files can be sanitized. Sensitive files can be redacted.
MetaDefender Kiosk lets you trust all portable media that enters or exits your facility.
The secure data transfer processes established by MetaDefender Kiosk help regulated industries meet compliance requirements.
Whether files are being imported into a secure environment or deployed out as deliverables, MetaDefender Kiosk establishes a secure process that can be replicated globally.
Portable media are the most common vehicle for infecting isolated environments. By combining over 30 anti-malware engines in a single scanning device, threat detection levelscan exceed 99%.
Deep Content Disarm & Reconstruction (Deep CDR) capabilities actively remove suspect and superfluous data from common file types—including .doc and .pdf—outputting clean, usable files.
2x USB Type A, 15-in-1 card reader, CD/DVD Drive, and 3.5” Diskette.
Incorporates File Integrity Monitoring and Application Whitelisting.
FAT, NTFS, Ext, HFS+ & APFS; VHD & VMDK.
Digital signature validation is conducted every time media is inserted into a device, blocking unscanned media from accessing your environment.
Wipe portable media completely clean, before loading approved content.
Integrates seamlessly with MetaDefender Vault and best-in-class data diode providers for secure data transfer and storage.
Advanced Threat Prevention Platform
MetaDefender is a cyber security platform for preventing and detecting cyber security threats on multiple data channels.
MetaDefender protects organizations from cyber security threats in data that originates from a variety of sources, such as web, email, portable media, and endpoints. The MetaDefender philosophy is:
Organizations have difficulty tracking and securing all data transfer channels that expose them to security threats, especially large enterprises with thousands of employees and contractors. Data transfer channels, such as file uploads, portable media devices, and email attachments, all have the potential to carry targeted attacks that can damage an organization’s reputation, financial standing, customer relationships, and for critical infrastructure, sensitive equipment and the facility itself.
Most cyber security solutions rely upon detection as their core protective function. MetaDefender deep content disarm and reconstruction does not rely on detection. It assumes all files could be infected and rebuilds their content using a secure and efficient process. It supports more than 30 file types, and outputs safe and usable files. Deep content disarm and reconstruction (Deep CDR) is extremely effective in preventing targeted attacks, ransomware, and other types of known and unknown malware threats.
MetaDefender multiscanning uses multiple anti-malware engines to provide superior detection rates of known and unknown threats and deliver extremely fast malware outbreak prevention. MetaDefender customers can simultaneously leverage the combined threat prevention capabilities of more than 30 anti-malware engines using both signature heuristic scanning and machine learning capabilities.
All applications contain vulnerabilities of different degrees of severity that threat actors can exploit. Our file-based vulnerability assessment of binaries and installers detects known vulnerabilities within files and application vulnerabilities in software programs before they are installed on endpoint devices, including IoT devices. We support vulnerability detection for over 1 million files and over 20,000 applications.
MetaDefender proactive data loss prevention (Proactive DLP) can help prevent potential data breaches and regulatory compliance violations by detecting and blocking sensitive data in files and emails, including credit card numbers and social security numbers. MetaDefender DLP supports a wide range of file types, including Microsoft Office and PDF.
Customers can implement our industry-leading deep content disarm and reconstruction, multiscanning, and file-base vulnerability assessment technology through either our MetaDefender Cloud service or by deploying MetaDefender software solutions within their own environment, including air-gapped networks.
Deep Content Disarm and Reconstruction (Deep CDR) – Sanitize over 30 common file types, and rebuild each file ensuring maximum usability with safe content.
Multiscanning – Scan with over 30 anti-malware engines using signatures, heuristics, and machine learning technology for the highest and earliest detection of known and unknown threats.
File-based Vulnerability Assessment – Detect known vulnerabilities in more than 20,000 software applications using over 1 billion hashes.
Proactive Data Loss Prevention (Proactive DLP) – Content-check emails and 30+ common file types for PII before they are transferred.
Archive Extraction – Quickly unpack over 30 compressed file types to speed up multiscanning and improve malware detection.
File Type Verification – Detect spoofing of over 4,500 file types and block spoofed files from entering your organization.
Workflow Engine – Customize security policies to process files in the most efficient and secure way for your organization.
For integration with existing security architectures via REST API
For processing files entering secure networks on portable media
For a second layer of defense against advanced email attacks
For detecting and preventing threats in web traffic
For securely transferring and storing files entering networks
For integrating our large hash database, IP reputation services, and more
For inspecting devices before they enter facilities and networks