Monitor and remediate the configuration of endpoint security applications
Check and update malware definitions on any endpoint. Check when a full system scan was last performed and launch one on any endpoint. Turn real-time protection on or off on any endpoint. Verify whether each endpoint’s firewall is enabled and enable them without any end user intervention. Verify whether anti-phishing protection is enabled on any endpoint.
Ensure that applications on any endpoint comply with policy and regulations
MetaAccess provides the ability to either block or remove potentially unwanted applications. You can create features that selectively block or remove over 2,000 versions of popular applications (of both enterprise and consumer software) without any end user interaction. With it, your organization can silently detect such applications on any endpoint and completely remove them. It also detects and removes potentially unwanted applications (PUAs) that can expose sensitive endpoint information without informed consent of the user (like browser toolbars, public filesharing programs, and backup or cloud-sync apps).
Monitor and remediate application and operating system updates and patches
Detect third-party patch management applications and enable them if necessary. Detect which patches are currently installed on any endpoint, generate a list of missing patches, and automatically install them.
Verify that endpoints are encrypted per policy
and regulations
Detect hard disk encryption software on each device and report which portions of each disk are encrypted. Leverages our patented method for assessing the encryption status of selected disks (Patent No. 10,229,069) and operates independently of third-party encryption algorithms and configurations. Supports all popular encryption solutions.
Powerful and Thorough information reporting
and remediation
Support over 30 different product-specific remediations across all major operating systems. It gathers classified and unclassified application details, and in-depth configurations of security applications, including anti-malware, personal firewall, hard disk encryption, patch management, browsers, browser plugins, and many others. This enables organizations that must comply with regulatory frameworks to easily gather information from endpoints to help them achieve compliance.