This guide shows you how MetaAccess can be easily and seamlessly integrated into Cisco Secure Access Solutions to provide enhanced security checks and advanced threat detection.
By integrating MetaAccess into Cisco security solutions, administrators are able to check remote devices for:
Vulnerabilities - Detect vulnerabilities on endpoints in installed applications and operating systems.
Enhanced Compliance - Get greater visibility into the status of installed security applications such as hard disk encryption and system information such as password protection to ensure devices are compliant with existing policies.
Unwanted Applications - Detect and remove non-compliant or unwanted applications such as peer-to-peer applications from a remote device.
Advanced Threats - Utilizing two methods of advanced threat detection, MetaAccess helps identify potential threats that existing anti-malware software might not protect against.
You can set up a MetaAccess account to manage up to 25 devices with free of charge. Start Trial Now
If your devices sit behind a firewall or a proxy, you need to whitelist domains to make sure devices are able to talk to OPSWAT MetaAccess cloud. See more details at How do I configure MetaAccess agent to work with a proxy or outbound firewall?
This article was last updated on 2018-09-06