We just finished hosting another successful event, the OPSWAT Cyber Security Seminar, held at the Israeli Air Force House in Herzliya, Israel. Along with our Israeli partners, eBusiness Design and Bulwarx, we held a seminar to demonstrate the latest research in the cyber security industry and showcased newest products and features as well as integrated solutions.
Our relationships with our Metadefender Core and Metadefender Cloud engine providers are extremely important to us. In order to maintain a strong relationship, we wanted to emphasize that our multi-scanning technology has different licensing options for Non-Security Application Developers compared to IT Admins. There are no third-party licensing restrictions to use our 90 data sanitization engines, also known as Content Disarm and Reconstruction (CDR), and Vulnerability Engine. Anti-malware engine availability differs in our multi-scanning packages depending on the intended use case:
Recently, McAfee Labs published a report describing advancements in macro-based malware that uses new techniques to evade detection. This malware avoids many of the markers that anti-malware products look for to detect malicious macros. One of these common markers are macros that launch on the document’s AutoOpen() or DocumentOpen() events. These macros also do some sophisticated checks to determine whether they are likely being executed inside of a sandboxed environment. If there is anything in the environment that suggests the file is being accessed inside of a sandbox, the malware does nothing in an attempt to evade detection.
Thank you to everyone who attended and took part in another successful event, the OPSWAT Symposium for Cybersecurity Experts & Developers in Santa Clara, CA. Along with our partners, VMRay, ARA Networks, RSA and InQuest, we held a half-day seminar to demonstrate the latest features of our technologies and how they can be integrated with other solutions to fit your data flow and device security needs.
In the last few years, many organizations have had to face numerous security issues due to the exponential proliferation of IP-enabled devices. Endpoint devices often leave the network perimeter and come back compromised or uncompliant, especially because employees need to access network data anytime and anywhere. With sophisticated cyber-attacks and the use of IoT, BYOD, and mobility on the rise, network exposure to data breaches has become very common. Organizations need solutions that provide visibility and manageability, while also reducing data exposure and helping them meet regulatory compliance requirements. Organizations lacking visibility and control over endpoint access authorization and continuous compliance incur significantly higher risk profiles. In order to reduce this risk, companies are challenged with finding solutions that are both technically sound, and do not incur implementation penalties that negatively impact operations.