How do I integrate MetaAccess with Pulse Secure's Host Checker?

This guide provides information on how MetaAccess can be easily and seamlessly integrated with Pulse Secure's Host Checker solution to provide advanced threat detection.

MetaAccess provides a single pane-of-glass with visibility in to any device that connects to your environment. While Host-Checker provides a few compliance check capabilities, MetaAccess can expend this functionality, as well as provide robust reporting using a dedicated cloud account.

By integrating MetaAccess with Pulse Secure's Host Checker solution, administrators can check remote devices for:

  • Vulnerabilities - Detect vulnerabilities on endpoints in installed applications and operating systems.

  • Enhanced Compliance - Get greater visibility into the status of installed security applications such as hard disk encryption and system information such as password protection to ensure devices are compliant with existing policies.

  • Unwanted Applications - Detect and remove non-compliant or unwanted applications such as peer-to-peer applications from a remote device.

  • Advanced Threat Detection - Utilizing two methods of advanced threat detection, MetaAccess helps identify potential threats that existing anti-malware software might not protect against.

  • Portable media scanning and access control - MetaAccess protects organizations against threats from portable media on the endpoints, a common attack vector for malware

Documents:

A specific DLL is required for integrating MetaAccess with Pulse Secure's Host Checker as a third party policy.

Contact OPSWAT Support for a copy of the DLL and follow the instructions (method #3) in the guideline document to integrate MetaAccess with Pulse Secure's Host Checker.

You can set up a MetaAccess account to manage up to 50 devices with free of charge. Start Trial Now

Notes:

This article was last updated on 2019-07-03
TT