Meta Networks has added new features to its secure remote access service, including client checks and full audit logs of client Web behaviors.
The product, called Meta NaaS, puts a twist on the typical VPN for PCs, laptops, and mobile devices. Rather than give the client full access to a network, Meta NaaS provides fine-grained access control that only lets users access an administrator-defined set of applications.
Meta NaaS starts with a software agent that resides on client devices. This agent creates an IPSec tunnel with the nearest Meta Networks Point of Presence (PoP).
This first PoP is like a roadblock, which checks the user’s identity and then presents the user with a list of allowed applications, including corporate applications and Web apps.
From the PoP, user traffic rides across Meta Networks’ private network to another PoP closest to the destination.
For clients that don’t run a dedicated agent, users can log in to Meta Networks via a browser to get application access.
Meta Networks has added new features to its platform, including posture checks of device state. As you’d get with a campus NAC solution, administrators can configure the client agent to check the OS version and patch level, AV status, certificate installations, registry entries, and more.
If a device fails a check, Meta Networks can send an alert to Slack, PagerDuty or other IT services.
For clients accessing applications via the browser (that is, without a client), the service can write a complete log of all user behavior, including URLs visited, services accessed, the names of files downloaded, and more.
The company has also added the ability for administrators to create Smart Groups using tags. Using the familiar key:value notation (i.e., employee_type:contractor), administrators can label users and services to create group policies. The objective is to simplify the creation and application of access policies.
For more on Meta Networks, check out my startup profile of the company.