Type to search
Analyze a file Free Tools

Benny's Blog

‹ Blog

Benny Czarny
CEO/Founder

Benny Czarny is the Founder and CEO of OPSWAT, a leading cyber security firm with over 1,000 customers, 150 employees, and 7 offices worldwide. Founded with personal investment in 2002 to offer a unique, market-driven approach to security application design and development, OPSWAT has been breaking new ground in the field of cyber security for more than 15 years. Most notably, OPSWAT has the distinction of protecting the majority of nuclear facilities in the US. Other key customers include, American Express, Coca-Cola, HP, Raytheon, US Bank, Chevron, GE Aviation and F5 Networks. Benny has over 20 years of experience in successfully identifying market needs and building, marketing, and selling innovative cloud-based cyber security products and solutions. From the early days of computer viruses, he was interested and involved in the fields of encryption, network operations, and security vulnerabilities detection and research. Prior to founding OPSWAT, Benny held technical leadership positions at NetManage, Netect and BindView. Benny earned a Bachelor's degree in Computer Science from the Technion-Machon Technologi Le' Israel.

Benny on social media: Twitter / Facebook / LinkedIn

A Message About the Kaspersky Ban and How It Affects OPSWAT Metadefender

Recently there was a presidential order to remove any deployment of Kaspersky Lab from any federal department and agency. Here is my response.

read more

OPSWAT Headquarters Featured in Toyota Ad

Toyota recently featured OPSWAT's San Francisco headquarters in their U.S. photo ad campaign for the 2017 Toyota Corolla. Take a look!

read more

We Exceeded Our 'Team for Kids' Fundraising Goal

Thanks for supporting me and my fellow executives in fundraising for Team for Kids for the New York marathon. With your help, we surpassed our fundraising goal!

read more

Update On Multi-scanning Engine Licensing Options

Our relationships with our Metadefender Core and Metadefender Cloud engine providers are extremely important to us. In order to maintain a strong relationship, we wanted to emphasize that our multi-scanning technology has different licensing options for Non-Security Application Developers compared to IT Admins. There are no third-party licensing restrictions to use our 90 data sanitization engines, also known as Content Disarm and Reconstruction (CDR), and Vulnerability Engine. Anti-malware engine availability differs in our multi-scanning packages depending on the intended use case:

Detecting Malware Outbreaks Faster Using Multiple Anti-malware Engines

At OPSWAT, we often encounter questions such as, "What is the value of multi-scanning?" and "Which Metadefender Core package is right for me?" Although we analyze large quantities of malware samples and deploy thousands of instances of Metadefender Core packages across many organizations, the answers to these questions are always the same – it depends. OPSWAT's multi-scanning technology works to improve detection of outbreaks by using a variety of engines from different geographical locations and by using a mix of both heuristic and signature-based detection. Heuristic analysis is especially useful for detecting new or unknown threats that emerge at the beginning of an outbreak.

Commercial Version of Metadefender.com Coming Soon

We are enhancing our Metadefender.com cloud threat intelligence platform to enable the only commercially available cloud multi-scanning platform supported by the anti-malware community.
 
Our team worked closely with anti-malware providers and already have 13 engines enrolled, with more in the pipeline.

read more

Executive Team Races for the Donation Finish Line

I recently realized that the last time I ran the New York City marathon was over ten years ago. I also had been beating myself up for a lack of involvement in charitable activities and knew that I needed to do something about it. I made it my 2016 New Year’s resolution to participate in the marathon again this year while raising money for a noble cause. It was an easy decision to run for Team for Kids because of the invaluable initiatives that its organization, New York Road Runners (NYRR) Youth Programs, puts forth to enable children nation-wide to overcome obesity and to encourage them to engage in activities that serve as building blocks for their development and advancement. Once I shared my excitement about running and raising money for this cause, it was easy to inspire excitement in my friends and fellow-executives Tom Mullen and Patrick Tan to join the race.

read more

OPSWAT Helps Film 5th Bourne Identity Movie

This year, we received a unique opportunity to help with the filming of the fifth installment of the Bourne Identity series, starring Matt Damon as Jason Bourne, a spy who must face a perilous journey to remember exactly who he is. Along with our Marketing Events Manager, Isabelle Azadmanesh, I flew down to Las Vegas to be part of the filming, which featured the OPSWAT booth and Metadefender Kiosk at the on-set cyber security tradeshow, "Exocon," filmed at the ARIA Resort and Casino. While on set, our Metadefender Kiosk and live threat video (shown below), were showcased. The Threat Map video was created by Kele Todd, our Video Art Director, who was inspired by Metadefender.com's Threat Map. Matt Damon and Tommy Lee Jones were among the stars seen on set.

read more

Update on OPSWAT Partnerships with the Anti-malware Engine Vendor Community

OPSWAT’s success can be partly attributed to our strong relationships with anti-malware engine vendors that are built on a foundation of mutual benefit, trust, and fairness.

read more

Five Steps to Securing Data Workflows in Your Organization

Every organization has data flowing into and out of the organization. Along with any data comes the risk of malware. To protect against threats, most organizations implement anti-malware solutions at different entry points, such as email, web, and portable media. However instead of tackling each entry point as a separate anti-malware project, organizations should treat secure data workflow as a complete process that addresses data cyber security in the company as a whole. By combining the different elements into one process, organizations obtain a complete overview, decreasing the chance of overlooking things and allowing them to benefit from synergies and increase efficiency.