How do I integrate MetaAccess to my NAC or SSL/VPN solution?

MetaAccess easily integrates with third party products such as Network Access Control, IPSEC VPN and SSL VPN, providing advanced compliance and compromised device information which these solutions can utilize to make enforcement actions.

By integrating MetaAccess into your NAC, SSL/VPN solutions, administrators are able to check remote devices for:

  • Vulnerabilities - Detect vulnerabilities on endpoints in installed applications and operating systems.

  • Enhanced Compliance - Get greater visibility into the status of installed security applications such as hard disk encryption and system information such as password protection to ensure devices are compliant with existing policies.

  • Unwanted Applications - Detect and remove non-compliant or unwanted applications such as peer-to-peer applications from a remote device.

  • Advanced Threat Detection - Utilizing two methods of advanced threat detection, MetaAccess helps identify potential threats that existing anti-malware software might not protect against.

  • Portable media scanning and access control - MetaAccess protects organizations against threats from portable media on the endpoints, a common attack vector for malware

Below is a list of product-specific guideline documents on integrating MetaAccess to a number of different NAC and SSL/VPN products.

MetaAccess_client-side_integration_guide.pdf

Integrate_Packetfence_with_MetaAccess.pdf

Integrate_F5 BigIP APM_with_MetaAccess.pdf

Integrate_Dell_Sonicwall_with_MetaAccess.pdf

Integrate_Citrix_with_MetaAccess.pdf

Integrate_Portnox_with_MetaAccess.pdf

Integrate_Forescout_Counteract_with_MetaAccess.pdf

You can set up a MetaAccess account to manage up to 25 devices with free of charge. Start Trial Now

Notes

  • these documents are only guidelines to be used as the starting point of an integration initiative. These guidelines were written in 2015 based on integration work we did in our labs using the current versions of the NAC and SSL/VPN products.

  • the documents MetaAccess is referred to as Gears, which was the name of our product at that time.

  • If your devices sit behind a firewall or a proxy, you need to whitelist some domains to make sure UAG and devices able to talk to OPSWAT MetaAccess. See more details at How do I configure OPSWAT agent to work with a proxy or outbound firewall?

This article applies to MetaAccess product.
This article was last updated on 2018-09-07
EA