Type to search
Analyze a fileFree Tools

Blog: Software Manageability

OPSWAT Partners with AV-TEST and AV-Comparatives for Enhanced Certification Program

OPSWAT partners with AV-TEST and AV-Comparatives as part of its enhanced Certified Security Applications Program. The new partnerships add to OPSWAT’s Certified Security Application Program’s compatibility tests to certify application’s detection quality, as well as OPSWAT’s tests for false positive responsiveness.

A Look Back at SCADA Security in 2015

It should come as no surprise that Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that control key functions in critical infrastructure are especially at risk of cyber attack. If saboteurs manage to compromise critical infrastructure services, a country’s economy and military defenses can be severely hampered.  In addition, since organizations that operate critical infrastructure often own valuable intellectual property, this information can be a target for foreign state actors trying to steal intellectual property to advance their economies or to win competitive bids.

read more

New: Manage Multiple Metascan installations with Central Management

Are you a Metascan customer with multiple Metascan installations? Your job just got a whole lot easier with the new Metascan Central Management system. Instead of having to manage each Metascan installation individually, this can now all be done from a single location.

Busted: 3 Myths about Endpoint Visibility

Maintaining endpoint visibility with or without client agents is fundamental to any network or information security architecture, and is an important element in protecting your organization’s intellectual property and bottom line. Unfortunately, there are myths implying that endpoint visibility is both troublesome and risky, even unnecessary or unwanted. Before purchasing an endpoint visibility solution, here are three myths about endpoint visibility and why they don’t apply to OPSWAT Gears.

Video: A Closer Look at Arbit and OPSWAT's Joint Solution

Last month, we attended the NIAS Cyber Security Symposium in Mons, Belgium with our partners from Arbit Security. Arbit, providers of a one-way data diode, have integrated their product with our Metadefender product in order to provide secure data flow for high-security networks such as military organizations or nuclear facilities. Metadefender allows files contained on portable media devices such as USBs to be checked for threats before they are allowed to enter the diode. In order to determine whether it is safe for files to enter the diode, Metascan®, our multi-scanning solution performs a check for malware.

read more

Data Sanitization (CDR), Part 3: Active Content Curing

After discussing content disarm and reconstruction (CDR) in part one of this series and file structure alterations in part two, let's look at content curing.

3 Reasons Why the Nuclear Industry is a Good Cyber-security Example

Last week I attended a workshop for the Nuclear Information Technology Strategic Leadership (NITSL) in Minneapolis, MN. The focus of the workshop was to discuss IT-related issues in the nuclear industry as well as define and share best practices for the implementation of IT systems. A significant consideration in the implementation of such systems is the concern over securing them against threats, which can be addressed by the malware detection and data sanitization capabilities of OPSWAT’s Metascan® and Metadefender products.

read more

Gears Automatically Prompts Users to Resolve Issues

We just released a new version of Gears! If you haven't been following our roadmap across America, it isn't too late to get up to speed on all of our new features. In this month's release, code name Tennessee, we sought to empower users to keep their devices compliant with the security policies set by the admin. Compliant devices don’t always stay compliant, and therefore secured endpoints and networks don’t always remain secured. By reducing both the time and effort required to remediate a device, both device users and network administrators can better protect their shared network. 

read more

Data Sanitization (CDR), Part 1: The Case for Data SanitizationFuture post

Document-based malware exploits are a common method for attack. Content disarm and reconstruction (CDR), or data sanitization, is the best way to combat this.

Video: How to Report a Missing Product in OESIS

Our latest OESIS support video will show you how to report a missing product that isn't being detected or managed properly by submitting a request through the OESIS Endpoint Assessment Tool. The OESIS Endpoint Assessment Tool provides a visual representation of the capabilities of the OESIS Framework. By following the video below, you will be able to submit both enhancement and new product support requests as needed.

read more