Blog Tag: How-To

10 Things to Include in Your Employee Cyber Security Policy

November 27, 2017 by Deborah Galea
When addressing cyber security threats, human error is a factor that is often overlooked. However, according to the 2016 IBM Cyber Security Intelligence Index, 60% of attackers in 2015 were insiders, and one-third of those attacks...

Video: Getting Started with Metascan and Proxy SG

January 22, 2016
Detecting and preventing advanced threats from entering your organization's network requires scanning network traffic. By establishing a proxy server and scanning all traffic going in and out of your network with an advanced anti-malware...

Monitor and Share your Web Application Status Using and Uptime Robot

November 25, 2014 by Yiyi Miao
We recently made a status page available for multiple OPSWAT products, to provide our users with visibility to the availability of the related services for our web applications. We wanted to share a little bit about this status page and...
Tags: How to