Type to search
Analyze a fileFree Tools

Blog: Kiosk & USB Security

OPSWAT Releases Media Validation for Metadefender Kiosk and ClientFuture post

OPSWAT released a new version of Metadefender Client that includes media validation, which allows it to be deployed with Metadefender Kiosk as part of a comprehensive solution to handle portable media in secure environments.

Event Wrap-Up: NITSL Conference and Metadefender Kiosk Workshop

The annual NITSL Conference was held July 17-20 in San Francisco, California. Afterwards we hosted a workshop for our Metadefender Kiosk customers.

New OPSWAT Metadefender Kiosk 4.0.0 Provides Revamped User Interface and More Customization

OPSWAT released Metadefender Kiosk 4.0.0 to provide customers with an updated customizable user interface that includes multi-language support. 

OPSWAT's New Metadefender Client Feature Protects Endpoints from Malware on USB Drives

OPSWAT announced the release of a new Metadefender Client feature that protects endpoints by blocking USB drives until they've been scanned by Metadefender.

Event Wrap-Up: NEI Cyber Security Implementation Workshop in Savannah

At the recent NEI Cyber Security Implementation Workshop in Savannah, Georgia, the OPSWAT team demonstrated how Metadefender helps protect nuclear facilities.

Product Feature: Enhanced File Transfer in Metadefender Kiosk

With the latest release of Metadefender Kiosk (3.3.5), users now have more flexibility in the way they can use the functionality in Metadefender Kiosk to copy clean files to trusted portable media. This is an enhancement to a feature introduced a while ago in Metadefender Kiosk, that allows users to copy all clean files to trusted media that they provide, so that the original media does not have to be introduced to their secure environment. This helps prevent attacks from media that has been compromised to have a malicious, hidden partition, or other malicious firmware.

read more

New RFID Reader Custom Authentication Module for Metadefender Kiosk

OPSWAT has recently released a reference implementation to show how Metadefender Kiosk users can use the pcProx Plus RFID reader with their deployment to authenticate users based on RFID cards or badges. The source code and compiled binaries are available for download on the OPSWAT Portal. This reference implementation will read the RFID identifier from a card or badge and use that as the username for a Metadefender Kiosk scanning session. Included in the implementation is also a simple database that shows how cards can be looked up and associated with a specific user. Metadefender Kiosk users can modify this sample for their own user database implementation.

read more

Metadefender Kiosk Now Supports Sending Scan Reports by Email

OPSWAT is excited to announce the release of Metadefender Kiosk 3.3.2, available for download on the OPSWAT Portal. Included in this release is the ability to specify an email address where Metadefender Kiosk will send copies of the reports for each scanning session.

read more

Why Data Diodes are Essential for Isolated and Classified Networks

Søren Elnegaard Petersen, Key Account Manager at Arbit Security, discusses the essential security components for organizations using isolated or air-gapped networks. Read our guest post from the unidirectional networking experts, and learn how data diodes can improve security and usage of your network.

8 of the Largest Data Breaches of All Time

There have been 5,754 data breaches between November 2005 and November 2015 that have exposed 856,548,312 records. According to their data, there were 783 breaches in 2014, the largest number of data breaches in a single year to date. Data also indicated that 29% of breaches involved hacking incidents in 2014, compared to just 14.1% in 2007. This shows an upward trend in the number of data breaches resulting from an outside cyber attack. Although this data includes a comprehensive list of data breaches, whether large-scale or small, there are a few that stand out from the rest as some of the worst data breaches in history in terms of resulting costs and the number of records compromised. Below is a list of 8 of the worst breaches in history that highlights the cause of the breach and the effects on the public and business sectors. 

read more