Videos from RSA 2012
Thanks to everyone who came by our booth at RSA Conference 2012! We donated $1 to the American Red Cross for every booth visitor - a total donation of $600!
And congratulations to Andrew Hayter of ICSA Labs who won our iPad drawing!
At the conference OPSWAT also met with several partners and customers to discuss our collaborations through Metascan, OESIS, OPSWAT Certification, and AppRemover. Watch these video interviews to learn more about how OPSWAT partners with these companies:
Watch these video interviews to learn more about how OPSWAT partners with these companies:
Array Networks talks about the benefits of OPSWAT Certification [[nid:895 click_video=false]] | Brian Lilley talks about OPSWAT Certification [[nid:902 click_video=false]] | David Perry from G Data talks about AppRemover [[nid:904 click_video=false]] |
GFI discusses Metascan Technology [[nid:918 click_video=false]] | Juniper talks about the OPSWAT Certification Program [[nid:919 click_video=false]] | Norman talks about Metascan technology [[nid:928 click_video=false]] |
Silicium talks about Metascan technology [[nid:937 click_video=false]] | ValidEdge discusses Metascan Multi-scanning Technology [[nid:939 click_video=false]] | Bitdefender talks about OPSWAT Certification [[nid:901 click_video=false]] |
Thanks again to everyone for a great show. See you next year!

- Academy 10
- Advanced Threat Prevention 54
- CEO's Blog 20
- Certification 28
- Company Announcements 30
- CTO's Blog 23
- CVEs 183
- Deep CDR 40
- Email Threat Prevention 21
- Kiosk & USB Security 31
- Product Announcements 169
- Reports 28
- Secure Access 22
- Technology Partnerships 36
- Vulnerabilities 21
- Secure Data Storage 3
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- OPSWAT Released a New Advanced Email Security Comparison Guide
- Infographic: File Upload Security – A Mission Against Malware
- Can You Spot the Social Engineering Techniques in a Phishing Email?
- Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- Police Handing Out Malware-Infected USBs Is Not an Isolated Incident
- 10 Things to Include in Your Employee Cyber Security Policy
- 11 of the Largest Data Breaches of All Time (Updated)