OPSWAT is excited to announce that our powerful data sanitization technology is now available in our next generation Metadefender Core product. In Metadefender Core v4.5.0, administrators will have access to the following in all workflows:
At OPSWAT, we often encounter questions such as, "What is the value of multi-scanning?" and "Which Metadefender Core package is right for me?" Although we analyze large quantities of malware samples and deploy thousands of instances of Metadefender Core packages across many organizations, the answers to these questions are always the same – it depends. OPSWAT's multi-scanning technology works to improve detection of outbreaks by using a variety of engines from different geographical locations and by using a mix of both heuristic and signature-based detection. Heuristic analysis is especially useful for detecting new or unknown threats that emerge at the beginning of an outbreak.
Just like Metadefender Core (Metascan) 3.x, Metadefender Core 4.x supports deployment in either online or offline environments, although there are some differences between the two versions. Since the process has changed, we would like to provide an update to our users that will be upgrading to Metadefender Core 4.x in an offline environment.
OPSWAT periodically reviews the engines included in each of the standard Metadefender Core engine packages to determine if we are providing the best combination of engines for our customers. With the recent release of Metadefender Core, we have changed the engines included in each of the standard packages.
Incorporating feedback from the public beta release, OPSWAT’s Metadefender Core v4 technology is now available for production deployment in a Windows environment! As part of our streamlined product offering, Metadefender Core v4 enhances system administrators’ abilities to update and scale. Utilizing OPSWAT’s multi-scanning technology, Metadefender Core now can be deployed on Windows systems in addition to Linux systems.
A new ransomware called PowerWare was recently identified by researchers at Carbon Black. This threat is spreading through phishing emails containing Microsoft Word documents embedded with malicious macros. We have seen a few examples of this threat uploaded to our public Metadefender.com site, where users can scan files, hashes and IP addresses for threats.