In past blog posts we’ve discussed the detection rates for antivirus engines and the true value of utilizing multiple antivirus engines to scan for malware. The latest study we’ve performed shows that using multiple scan engines as well as multiple types of scanning (for example, static vs. dynamic file analysis) provides greater insight as to what potential risks may be present on a machine.read more
The recent 2014 Cyber Security Forecast released by Kroll Security Group predicts the most significant security issues organizations will face in 2014 and also does a great job of highlighting the added value of our GEARS platform going forward. Here are some examples, quoting from the Kroll press release:read more
Here's a fresh batch of OPSWAT Certifications. These may not be soft or sprinkled with sugar like those cookies found around the holidays, but system administrators, home users, and security vendors definitely know how sweet it is having security applications that are compatible with the latest compliance checking solutions.read more
Before you sit down to have a great Thanksgiving feast, don't forget to check out the latest exciting releases and updates we put out in November! This past month saw the release of our XML feed OESIS Signatures and an easy how-to guide for setting up our multi-scanning technology with your existing proxy server!read more
One way a network or workstation can become infected is by someone unknowingly downloading a malicious file from the internet. While they may think they are downloading an informative article or helpful new tool, there is a risk that it will actually be malicious code. One way to mitigate this risk is to use a proxy server that performs virus scanning of end user downloads using the ICAP protocol.read more
We recently sent several representatives to attend the fifth annual Cybersecurity Framework Workshop hosted by NIST (The National Institute for Standards and Technology) in Raleigh, North Carolina. The purpose of the workshop was to facilitate a discussion between government, critical infrastructure and industry professionals on the voluntary cyber security framework that NIST is developing as directed by Executive Order 13636, Improving Critical Infrastructure Cybersecurity.read more
OPSWAT today announced the release of OESIS Signatures, a separately licensed extension of OESIS Framework, the industry-standard SDK for checking endpoint compliance. OESIS Signatures is a new XML feed that provides detailed information for developers about how to detect, assess and manage thousands of endpoint applications.read more
Our latest batch of OPSWAT Certification features some familiar faces – Avira, avast! and Panda Security – while we also have a new addition to the OPSWAT Certification family, Cysec. A total of 4 categories received new certifications. System administrators, home users and software vendors can now add the certified security applications to their list of products that are compatible with leading technology and network solutions.
More and more companies are using Cloud services, such as Dropbox, Windows Azure or
Amazon S3 to store digital files. Although cloud storage makes transferring files more convenient, this convenience also makes it easier for malware to enter a network and spread within an organization. In this post, we will describe how the Metascan Online API can be used to protect against malware that is introduced either through file download links or through files uploaded to a web app hosted in the cloud.
With the rise in cyber-attacks against critical infrastructures, various organizations are seeking out several methods to prevent the infiltration and spread of malware in their security infrastructure. One very well-known virus is still found to be attacking these infrastructures, and seems to be infecting these facilities the same methodical way as before.read more