Endpoint Security

Powerful Technology to Remediate Endpoint Security and Compliance Issues

OPSWAT's endpoint security technology enables software engineers and technology vendors to develop products for securing and managing endpoints through detecting, classifying, assessing, and managing thousands of software applications. With close to 200 man-years of engineering resource investment, we support over 5,000 security applications from more than 600 vendors in 15 different categories. See supported anti-malware, encryption and patch management applications.

Certified Security Applications Program

One of the key foundations of our powerful endpoint security technology is the OPSWAT Certified Security Application Program. It certifies many different categories of endpoint security application compatibility, and particularly for Anti-malware applications, it also certifies false positives, and quality. The program provides Cloud Access Security Brokers (CASB), Network Access Control (NAC), SSL-VPN, and Single Sign-on (SSO) providers with compatibility information on thousands of leading access control applications from vendors like Palo Alto Networks, Cisco, Citrix, and many others. For Anti-malware applications, our testing includes information on the type of feedback channels available for documenting false positive submissions and vendor reaction time to a false positive submission. Anti-malware vendors can leverage our program to showcase their ability to protect against emerging threats and endpoints in real time. We have certified over 1,500 application versions from hundreds of security vendors.

Development Around the Clock

Our technology is supported by dozens of software engineers and security analysts around the world. We have a global analyst team to add product signatures and develop custom implementations on a 24/7 basis. This technology contains over 80,000 customized product signatures. The development and engineering process is executed at a global level which allows us to provide zero-day or close to zero-day support for newly released anti-malware, encryption, patch management and many other security applications.

Patented Generic Encryption Check

Our engineering team developed a unique, patented technology for determining whether device storage is encrypted without relying on product-specific implementation. A piece of data is written through a system API to the data storage which simulates the application layer interaction with disk storage. Then the data is retrieved through a low-level driver bypassing the system layer and directly interacts with the disk storage. We compare and associate the original data with the retrieved value and use the result as a key factor to determine whether the data is encrypted when stored on the disk.

Comprehensive Endpoint Security Checks

MetaAccess includes the following endpoint security checks:

  • Anti-malware compliance - Ensure device compliance by verifying the authenticity, active status and proper configuration of over 5,000 supported anti-malware applications.
  • Disk encryption check - Monitor hard drive and storage encryption and use our patented encryption detection technology to identify when a system volume is not encrypted.
  • Advanced threat and infection detection - Detect infected endpoints and improve zero-day threat detection by utilizing the power of multiple anti-malware engines and analyzing the local anti-malware threat log for repeated infections.
  • User authentication and screen lock - Detect whether adequate user authentication and lock screen timeouts are set in order to minimize the risk of data theft.
  • Patch level detection - Check whether the device operating system is up to date and patched.
  • Unwanted application detection - Detect, remediate, and clean up applications and files that cause security risks and use excessive memory.
  • Vulnerability detection - Using a scoring system based on OPSWAT and CVSS scores, MetaAccess provides visibility into the severity of vulnerable applications installed organization-wide as well as per device, and can deny access to vulnerable devices.
  • Antiphishing application detection - Ensure that the device has antiphishing protection installed and enabled.
  • Firewall detection and enabling - Ensure that the device has firewall protection installed and enabled.
  • Disk backup application activity check -Verify that the device is being backed up and that the backup is recent.
  • Available disk space check - Check that the device has adequate available disk space.