Secure Access

Endpoint security and compliance for cloud applications and networks

Don't Compromise on Security for Work From Home (WFH) Programs

March 16, 2020
A decade ago, it would have been completely out of the question; work from home (WFH) and access critical infrastructure? It was not going to happen. But amidst the COVID-19 outbreak, WFH is a necessity to keep operating. Even the largest...
Tags: SDP

Managing the unknown….The Unmanaged Devices Attack Surface Challenge

December 05, 2019
Author: Amir Gil, MetaAccess Business Director. It’s a fantastic time for hackers—less fantastic for companies that work with contractors, suppliers, partners, and remote employees. Allowing access to essential applications and data...

Making the Shoemaker Walk Barefoot—The Emerging Hacker’s Sport

November 06, 2019
Author: Amir Gil, MetaAccess Business Director, OPSWATHackers are doing their best to hack brand name cyber vendors and make them sweat. And the latest victim is… Avast with the second time their popular Ccleaner tool has been...

Shadow IoT: A Fine Kettle Of Fish

October 10, 2019
Author: Randy Abrams, Sr. Security Analyst, OPSWAT. We all have a fairly good idea of what IoT is. Depending upon who you talk to, IoT is the Internet of Things, the Insecurity of Things, or the Internet of Terror. If you work in an...

Certified Security Application Program, April 2019 update

April 30, 2019 by Hamid Karimi
5 new antimalware products were certified by OPSWAT in April at Gold and Silver levels. # Certified Product Level Category 1 ESET Endpoint Security 7.x for Windows Gold Anti-Malware 2 AhnLab V3 Internet Security...

OPSWAT Selected as SC Media 2019 Trust Award Finalist

January 08, 2019
OPSWAT MetaAccess Recognized as a Top Solution for Cloud Access Control OPSWAT®, a global provider of solutions that protect organizations from content and device based threats, today announced that MetaAccess® has been recognized as a...

Infographic: Secure Data Workflow - Defending the Castle

August 28, 2018 by Yiyi Miao
When dealing with highly secure networks one of the best ways to defend against threats is to isolate the network to minimize your attack surface.  This isolation can come in several different forms, with an air-gapped network being...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.