Meta’s Network-as-a-Service enables you to rapidly deploy zero-trust access from user devices to applications in the data center and the cloud. The first zero-trust enterprise network, Meta NaaS leverages a dense, cloud-native global backbone to deliver segment-of-one application access along with cloud-delivered internet security. For organizations that are updating their network security from a site-centric to a user-centric delivery model, Meta NaaS provides the security, flexibility and user experience you need.
Re-architecting the Perimeter for the Cloud Age
- Global backbone
- Identity-based policy routing
- Always-on VPN for managed devices
- Agent-free connectivity for unmanaged devices
- Cloud-delivered security stack
- Unified policy management
- Visibility, auditing & compliance
How it Works
Meta NaaS is a user-centric access solution that addresses the fragmentation and complexity of today’s security perimeter. With Meta NaaS, simply onboard user devices and network resources to the global cloud network, and define access policies. All traffic is secured: access to private applications and subnets is protected by a software-defined perimeter per-user, and internet traffic is protected by the security stack of your choice. Meta NaaS is the future of enterprise networking, abstracting the physical topology into a logical network that enables policy-based management of users and applications. Meta NaaS leverages the latest in cloud-scale technology to reduce latency and ensure the best possible user experience for employees, contractors, partners and customers, wherever they are located.
See a Demo
Managed Devices - Secure Corporate Access & Internet Access
Unmanaged Devices - Browser-based Corporate Access, No Client
Global Network Backbone
Designed to support millions of concurrent users, our cloud-native, encrypted overlay network features a constantly growing number of PoPs to reduce last-mile latency and optimize routing.
Each user device and network entity has a unique, permanent identity, embedded in network traffic for continuous verification and policy enforcement. Integrated with leading IdP and SSO solutions, the platform also leverages device-side certificates and a variety of second factors for authentication.
Meta NaaS enforces a software-defined perimeter per user. Since the network is zero-trust by design, all resources are hidden in a secure enclave and all access must be explicitly granted with a whitelist. All access is authenticated, authorized and continuously verified at the packet level.
Secure Internet Access
Just because users are working off-site, there is no reason to compromise on internet security. Using patent-pending “split tunneling in the cloud,” Meta NaaS directs internet traffic through the network security stack of your choice, delivered in the cloud.
Auditing and Analytics
Since user/device identity is permanent and embedded at the packet level, all network traffic is fully attributed and auditable. Integrated analytics support anomaly detection and compliance.