OPSWAT partners with AV-TEST and AV-Comparatives as part of its enhanced Certified Security Applications Program. The new partnerships add to OPSWAT’s Certified Security Application Program’s compatibility tests to certify application’s detection quality, as well as OPSWAT’s tests for false positive responsiveness.
As a company with more than 42,000 associates, EGS (Expert Global Solutions) was presented with a challenge that is encountered by many large companies - how to secure endpoint devices used by remote employees. EGS makes use of Workspace virtualization from RES Software (a form of virtual desktop infrastructure) for remote workers. They needed a way to prevent risky or compromised computers from accessing the virtual workspace. Employee-owned devices, especially when used remotely, are very difficult to monitor and secure. Employers do not want to directly manage these devices, but they are still liable for any breaches they may cause.
Adam Winn, Senior Product Manager at OPSWAT, demonstrates the OESIS Vulnerability Assessment Module. OESIS is a cross platform SDK that is designed to help developers create products to secure endpoints in NAC, SSL-VPN, and other endpoint assessment solutions. Watch the demonstration to see how quickly the module can scan devices for applications that need to be updated or removed.
As BYOD continues to grow, organizations will have to focus more resources on the protection of endpoint devices. Here are several considerations to keep in mind when choosing an endpoint security solution.
OPSWAT and Check Point Software Technologies have partnered to enhance security for devices and data. With the partnership comes advanced posture checking for managed and unmanaged devices. Gears admins can configure compliance policies based on their own custom needs that must be met before a user can access the network.
Each time someone reports that antivirus is dead, a hacker gets his wings (and I get furious). With our industries becoming increasingly data-driven, the need to protect our networks, devices, and archives has become more important than ever. In a world of weaponized emails and polymorphic, self-replicating malware, entertaining the idea that endpoint antivirus protection is dead is both ignorant and dangerous.
When addressing cyber security threats, human error is a factor that is often overlooked. However, according to the 2014 IBM Cyber Security Intelligence Index, over 95% of all incidents investigated involved human error. Although human error can never be eliminated entirely, incidents can be reduced by establishing clear cyber security guidelines and providing regular employee trainings.