Introducing OPSWAT Threat Intelligence Similarity Search Learn More

Cloud Access Control

Industry-Leading Technologies for Next Generation Access Control

MetaAccess, our cloud access control platform, incorporates our patented endpoint security and compliance technologies to further expand its capabilities. Our cloud access control technologies deploy innovative methods to determine the status of important compliance features, ensuring that only trusted devices are allowed access to local networks and cloud applications, avoiding data breaches and malware infections.

Disk Encryption Compliance

Our patented disk encryption status check (United States Patent No. 9,021,163) detects and reports the encryption state of the endpoint’s physical disk and reports if a system volume is not encrypted. Our innovative technology is able to detect disk encryption regardless of the encryption application used, providing comprehensive data encryption validation.

Integration with Single Sign-on Process

Our patented network access control with compliance policy check (United States Patent No. 9,288,199) seamlessly integrates with the single sign-on authentication process providing advanced device compliance checks. A typical workflow can be described as follows:

  • OPSWAT’s endpoint application performs the security and posture check on the device and periodically reports the information to the OPSWAT network access control server.
  • The network access control server then checks the reported endpoint compliance data against defined policies, and assesses compliance status.
  • To access the cloud application, users will be connected to the identity provider’s (IdP) authentication server. After users pass the credentials validation step, the authentication server forwards the authentication response in the form of an XML document (SAML) to the OPSWAT network access control server instead of the targeted SaaS application.
  • The network access control server then decides whether to grant or deny access to the SaaS application based on device compliance status.

Integration with Third-Party Applications

Our technology can easily be integrated by third-party vendors, such as cloud identity providers (IdPs), cloud access security brokers (CASBs) and traditional network access control (NAC) solutions, to perform security and compliance checks prior to granting access to cloud applications or local network resources. MetaAccess runs on an endpoint and periodically collects endpoint security and posture on the local device and reports back to the MetaAccess cloud. The compliance status of the device is assessed in the cloud against a security policy configured on an administrator console. Third-party solutions can retrieve the device identity from browser cookies, client certificates, or cross-domain APIs and then leverage MetaAccess OAuth API to retrieve the endpoint’s compliance information.