Skip to main content

Help us improve the Digital Marketplace - send your feedback

Barrier Networks

Barrier Networks Advanced Endpoint Compliance (OPSWAT MetaDefender IT-OT Access)

Leveraging the latest ZTA technologies, OPSWAT’s MetaDefender IT- OT Access Platform is a unified platform cloud solution for providing deep endpoint compliance, advanced endpoint protection, identity authorization, and secure access without hindering workflows. MetaDefender IT- OT Access is available on cloud or on-premises.

Features

  • Endpoint infection detection with 30+ anti-malware engines
  • Comprehensive anti-malware compliance verification
  • Detection and fingerprinting of over 5000 third-party applications
  • Disk encryption status check using OPSWAT patented technology
  • User authentication and screen lock check
  • Detect vulnerabilities on the endpoint
  • Seamless SAML Support
  • Lightweight Deployment Option

Benefits

  • Regulatory Compliance
  • Reduced Support Overhead
  • Central Visibility

Pricing

£40.99 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@barriernetworks.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 5 8 1 5 0 5 7 2 9 0 2 3 7 2

Contact

Barrier Networks Iain Slater
Telephone: 0141 356 0101
Email: info@barriernetworks.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Secure Email Gateways, Secure Web Gateways, Web Application Firewalls, SSO and MFA solutions.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Supported Client Operating Systems - Windows 7+, Windows Server 2003+, macOS 10.8+, iOS 7.0+, Android 4.1+, Ubuntu 14+/CentOS 7+, open source Internet of Things (IoT).
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 48 working hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
OPSWAT Portal: Create and manage tickets with OPSWAT Support, download products and version updates, and view your license information

OPSWAT Knowledge Center: View product user guides, KB articles, release notes, and featured articles

Standard Support: 0800-1700 1 - 3 BUsiness Days SLA PORTAL ACCESS ONLY

Gold Support: Support Account Manager, Quarterly Reports, 0700-1900, Portal Access, Telephone SUpport Mon-Fri, SLA 2 Hours - 2 Business Days

Premium Support: Weekly Reports, Monthly Conference Call Reviews, Support Account Manager, Quarterly Reports, 24/7, Portal Access, Telephone Support, SLA 1 Hour - 1 Business Day
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Barrier Networks onboards customers by gathering all key information required to bring the service live. All system information and supporting documentation is developed and distributed to the customer as part of the onboarding process. Detailed design documentation is derived from this initial documentation. The detailed design is agreed and signed off by both parties prior to implementation. A full copy of the system documentation is provided following user acceptance testing.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data is provided upon request by Barrier Networks once the contract has ceased.
End-of-contract process
All Software functionality is provided for the duration of the contract with Barrier Networks. Once the contract has ceased, the organisation will be off-boarded, information securely deleted from the Barrier Networks database, and tenant is removed at no extra cost. Bespoke off-boarding requirements can be purchased via "Barrier Networks Cyber Security Consultancy Services".

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The OPSWAT Portal provides:
Product releases and documentation
Support and ticketing system
Channel partner resources
Security applications certification program
Accessibility standards
None or don’t know
Description of accessibility
Available on request
Accessibility testing
None
API
Yes
What users can and can't do using the API
MetaAccess API. MetaAccess offers APIs to add endpoint security and cloud access control to your existing security solution, saving developer time and allowing you to focus on your core business. Our cloud platform is used to enforce device security and compliance for enterprise networks as well as SaaS applications. https://www.opswat.com/developers/metaaccess-api
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Customisation is available for
- GUI
- Policy
- Deployment

Scaling

Independence of resources
Service is either deployed in customer / private cloud or single tenant public cloud.

Analytics

Service usage metrics
Yes
Metrics types
Users
Transactions
Files scanned
Files allowed/sanitised/blocked
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
OPSWAT

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The method of exporting data is agreed during implementation.
Data export formats
Other
Other data export formats
Agreed at the time of implementation
Data import formats
Other
Other data import formats
Agreed at the point of implementation

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.50%
Approach to resilience
Autoscaling, details available on request
Outage reporting
Email & trust.opswat.com

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Management interfaces are governed by role based access control. Support access is via registered accounts
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman
ISO/IEC 27001 accreditation date
Sept 2020
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC 2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus
Information security policies and processes
All employees of Barrier Networks must abide by the Barrier Networks Information Security Policy and Acceptable Use Policy. Barrier Networks follow the processesCyber Essentials as well as key processes and procedures from ISO27001.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All changes and configuration management follow ITIL V3 best practice.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All external facing services are subject to monthly vulnerability scans. Patching takes place monthly with emergency patching taking place within 1 week of the vulnerability detection. In extreme circumstances and to protect the security of the organisation and customer, Barrier Networks will patch on the same day.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our SOC provides Intrusion Detection Vulnerability Assessment and security alerting for malicious activity. IDS and Network Monitoring component provides real-time detection of security incidents. If an intrusion/breach is detected, a security alert is issued which generates an automatic ticket within the SOC Helpdesk software. These tickets are classified based on the Priority. Our incident response process is designed in alignment with NIST Special Publication 800-61 Revision 2 and is a service that is available to customers
Incident management type
Supplier-defined controls
Incident management approach
Incident Response Service for managing security incident and is based on NIST Special Publication 800-61 Revision 2 . Incidents are logged with a unique case reference number and tracked from triage through to resolution via our service desk platform. We have pre-approved processes / changes for certain tasks, however day to day operation is bespoke per customer and may change depending on the organisation’s needs. Users can report incidents via email, web or telephone. Reports are provided via email upon request. Major incident reports are provided within 48 hours of the incident resolution. Updates available upon request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

OPSWAT continues its drive to run a sustainable business. Our policy of ensuring our global offices meet the highest level of environmental credentials is key to our sustainability commitments. e.g. SkyCenter ONE, our new US global HQ is Tampa's first LEED Platimum-certified building - the highest ranking offered by the US Green Building Council.

Covid-19 recovery

OPSWAT remained fully operational across all nine of our global locations. Our business continuity plans were activated and our systems and personnel operated as planned. We are working with our employees to help ensure they remain both productive and safe at all times. Our teams are fully equipped with remote access capabilities can seamlessly work across all geographic regions where we have employees.

Tackling economic inequality

Opswat believes one of the best tools to tackle inequality around the world is education. OPSWAT Academy continues to lead in cybersecurity education after surpassing 50,000 certified professionals, issuing more than 70,000 certifications, and expanding the course offerings with nine associate and seven professional training programs. We offer both on site and on line training to ensure optimal availability around the world.

Equal opportunity

OPSWAT believe that our diversity is our strength and we respect the unique knowledge of every team member. OPSWAT recognised as one the best companies to work for in Asia by HR Asia Magazine.

Wellbeing

Opswat implements programs and initiatives to safeguard our employees against work-related illnesses and accidents, and improve the wellness of staff, both physically and mentally. Our global offices offer green and clean environments to work with wellbeing areas and locality to health and fitness facilities. Our competitive compensation packages include health cover and guidance provisions.

Pricing

Price
£40.99 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Available on request

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@barriernetworks.com. Tell them what format you need. It will help if you say what assistive technology you use.