The Update You Can’t Afford to Skip: End of Support for Office 2016 & Office 2019

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

OPSWAT Update – July 2022

By OPSWAT
Share this Post

July was a busy month for OPSWAT! Read about our exciting updates, and if you haven’t already, be sure to follow OPSWAT on LinkedIn, Facebook, and Twitter for real-time updates.

OPSWAT in the News 

OPSWAT Becomes AWS Security Competency Partner

OPSWAT has achieved the Amazon Web Services (AWS) Security Competency in the Data Protection category. This designation recognizes that OPSWAT has demonstrated and successfully met AWS’s technical and quality requirements for providing customers with cybersecurity expertise in Data Protection to help them achieve their cloud security goals.

Read More

Help Net Security | What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare

At the recent meeting of the North Atlantic Council in Madrid, NATO heads of state agreed to boost resilience to cyber and hybrid threats. In this Help Net Security video, Itay Bochner, OPSWAT’s Director of Malware Analysis Solutions, talks about NATO’s virtual rapid response cyber capability and what it means.

Learn More

Haaretz Labels | From Nuclear Reactors to Banks: A Multi-Arm Platform to Protect Critical Infrastructure

With a defined vision to protect critical infrastructure, OPSWAT has built an extensive, multi-arm platform that includes 21 different products tailored to complex networks. Benny Czarny, Founder and CEO of OPSWAT, explains in this article why traditional cyber security tools are not optimized to protect critical infrastructure and presents the solutions the company has developed for over 1,500 customers from various industries in more than 80 countries.

Learn More

Check out our recent global and media coverage highlights at OPSWAT in the News and Press Releases to see how we are continuing our commitment to protect the world’s critical infrastructure.

OPSWAT Academy Cybersecurity Training Updates

OPSWAT Academy’s new MetaDefender Core Professional Course has now released Series 4: User Management, and Series 5: Automated Deployment. Any administrator of the MetaDefender Core v5 product can use these courses to maximize the effectiveness of their File Analysis deployments. Stay tuned for more upcoming MetaDefender Core v5 Professional Series releases.

Be sure to check out our OPSWAT Academy social media pages and join the OPSWAT Academy Community!

Register for OPSWAT Academy at no cost.

Visit OPSWAT Academy page for more information.

OPSWAT Product Spotlight

MetaDefender Core v5.2.0 Release

OPSWAT MetaDefender Core protects your organization by preventing advanced cybersecurity threats on multiple data channels. This new release supports new operating systems, the ability to export an executive report to a PDF, file digital signature verification and more.

Learn More

MetaDefender Core Now Requires Microsoft Visual C++ Redistributable 2017

This is a reminder that the Visual C++ Redistributable 2017 package is required for all Windows deployments of MetaDefender Core. If you don’t yet have the Visual C++ Redistributable 2017, please download and install it from the Microsoft website. Without this Redist package installed, every time MetaDefender Core attempts to deploy the latest File Type and Archive modules, it will fail, resulting in a short outage (no more than a few seconds) that could lead to a few files failing to be processed.

Read More

Critical Infrastructure Resources

DLP, a Must for Any Removable Media Security Program

When considering the use of removable media within a secure area, we are often concerned with preventing malware or threats from entering our site. We rarely think about what happens when those devices, and at times, our data, leave the site. OPSWAT offers many options for bringing in critical patches and updates without the risks that removable media, as well as safely bringing files into a protected area with no risk of the data going back out.

Learn More

Secure File Uploads in Web Applications for True Zero-Trust Security

Malicious payloads can be hidden within innocuous content inside a file that is uploaded to your web apps and transferred through your network. However, these attack vectors are not addressed by SWGs (Secure Web Gateways), Proxies, WAFs (Web Application Firewalls), etc., or even the Cloud Hosting Services providers. Organizations need a ‘plug-and-play’ solution that integrates quickly and easily with their existing infrastructure, can scale on demand, and helps them get Zero-Trust right. Read about our real-life use-case that illustrates the requirement, the threat, and the solution for one of our customers.

Learn More

Secure and Reliable Cloud Historian Connectivity Using OPSWAT’s NetWall Security Gateway

Data Historians are widely deployed in industrial control environments to record the operational state of the environment. As industrial operations continue to strive for greater efficiency, there will be greater dependence on industrial visibility across multiple plants to drive business decisions and reduce costs. Historians will play a major role, moving from being a historical archive to supporting near-real-time analysis, enabling more efficient industrial management. The resulting demand for greater volumes of readily available data is being met by historian vendors through the implementation of secure, cloud-based historians. Learn how OPSWAT’s NetWall Security Gateway can support secure cloud historian connectivity in our blog.

Learn More

Advanced Email Security Using MetaDefender Email Security Solution and Deep CDR™ Technology

Email security should be the top priority as it is still the number one initial attack vector for data breaches, according to IBM. A new cybercrime campaign has been discovered in the last month, with hackers finding a new way to smuggle malware onto victims' devices using PDF attachments. The malware was sent by email with the subject line “Remittance Invoice” to trick the victims to open the attachment. Organizations should adopt a zero-trust security approach with a proactive solution that treats all files as malicious and cleans them in real time using our Deep CDR™ Technology. Learn more about how we can provide advanced email security for your organization. 

Learn More

Additional Information

Subscribe to the OPSWAT Blog to receive access to regular tips and best practices on cybersecurity along with updates on OPSWAT technology and products.

If you would like additional information on any information in this newsletter or have other questions, please contact your OPSWAT account manager or request a consultation. 

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.