Blog Tag: OESIS

OPSWAT Access Control Certifications update for May 2020

June 02, 2020
Congratulations to F-Secure and Kaspersky for receiving OPSWAT Platinum Anti-malware certifications! The global COVID-19 pandemic in the month of May adversely affected the number of submissions to OPSWAT Access Control Certification...

OESIS Framework May 27, 2020 Release

May 27, 2020 by Alin Besnea
Product OverviewOESIS Framework is a cross-platform endpoint SDK that enables software engineers and technology vendors to develop products for securing and managing endpoints through detecting, classifying, assessing and managing...

OESIS Framework May 12, 2020 Release

May 15, 2020 by Alin Besnea
Product OverviewOESIS Framework is a cross-platform endpoint SDK that enables software engineers and technology vendors to develop products for securing and managing endpoints through detecting, classifying, assessing and managing...
Tags: OESIS

OESIS Framework Update

April 22, 2020 by Benny Czarny
I have good news to share about the OPSWAT Access Control Certification Program (OACC). First, over 100 endpoint security vendors now participate in the program including well-known brands such as Avast, Avira, Bitdefender, Carbon Black,...

OESIS Framework January 21, 2020 Release

January 27, 2020 by Alin Besnea
Product Overview OESIS Framework is a cross-platform endpoint SDK that enables software engineers and technology vendors to develop products for securing and managing endpoints through detecting, classifying, assessing and managing...

What does the acquisition of Impulse by OPSWAT mean to OESIS partners?

December 30, 2019 by Benny Czarny
Last week, I wrote a blog post announcing the acquisition of Impulse, a Tampa, Florida, provider of Network Access Control (NAC) and Software-Defined Perimeter (SDP).  The acquisition places OPSWAT as a leading vendor in the Zero...

Managing the unknown….The Unmanaged Devices Attack Surface Challenge

December 05, 2019
Author: Amir Gil, MetaAccess Business Director. It’s a fantastic time for hackers—less fantastic for companies that work with contractors, suppliers, partners, and remote employees. Allowing access to essential applications and data...

For more information, please contact one of our critical infrastructure cybersecurity experts.