OPSWAT partners with AV-TEST and AV-Comparatives as part of its enhanced Certified Security Applications Program. The new partnerships add to OPSWAT’s Certified Security Application Program’s compatibility tests to certify application’s detection quality, as well as OPSWAT’s tests for false positive responsiveness.
It should come as no surprise that Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) that control key functions in critical infrastructure are especially at risk of cyber attack. If saboteurs manage to compromise critical infrastructure services, a country’s economy and military defenses can be severely hampered. In addition, since organizations that operate critical infrastructure often own valuable intellectual property, this information can be a target for foreign state actors trying to steal intellectual property to advance their economies or to win competitive bids.
Are you a Metascan customer with multiple Metascan installations? Your job just got a whole lot easier with the new Metascan Central Management system. Instead of having to manage each Metascan installation individually, this can now all be done from a single location.
Maintaining endpoint visibility with or without client agents is fundamental to any network or information security architecture, and is an important element in protecting your organization’s intellectual property and bottom line. Unfortunately, there are myths implying that endpoint visibility is both troublesome and risky, even unnecessary or unwanted. Before purchasing an endpoint visibility solution, here are three myths about endpoint visibility and why they don’t apply to OPSWAT Gears.
Last month, we attended the NIAS Cyber Security Symposium in Mons, Belgium with our partners from Arbit Security. Arbit, providers of a one-way data diode, have integrated their product with our Metadefender product in order to provide secure data flow for high-security networks such as military organizations or nuclear facilities. Metadefender allows files contained on portable media devices such as USBs to be checked for threats before they are allowed to enter the diode. In order to determine whether it is safe for files to enter the diode, Metascan®, our multi-scanning solution performs a check for malware.
Last week I attended a workshop for the Nuclear Information Technology Strategic Leadership (NITSL) in Minneapolis, MN. The focus of the workshop was to discuss IT-related issues in the nuclear industry as well as define and share best practices for the implementation of IT systems. A significant consideration in the implementation of such systems is the concern over securing them against threats, which can be addressed by the malware detection and data sanitization capabilities of OPSWAT’s Metascan® and Metadefender products.
We just released a new version of Gears! If you haven't been following our roadmap across America, it isn't too late to get up to speed on all of our new features. In this month's release, code name Tennessee, we sought to empower users to keep their devices compliant with the security policies set by the admin. Compliant devices don’t always stay compliant, and therefore secured endpoints and networks don’t always remain secured. By reducing both the time and effort required to remediate a device, both device users and network administrators can better protect their shared network.
Our latest OESIS support video will show you how to report a missing product that isn't being detected or managed properly by submitting a request through the OESIS Endpoint Assessment Tool. The OESIS Endpoint Assessment Tool provides a visual representation of the capabilities of the OESIS Framework. By following the video below, you will be able to submit both enhancement and new product support requests as needed.