Why OPSWAT?

Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up.

To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device.

Why MetaDefender?
Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect.

That's why our advanced threat prevention platform, MetaDefender, is not only based on detection.

MetaDefender uses OPSWAT's unique deep content disarm and reconstruction (Deep CDR) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements deep content disarm and reconstruction with multiscanningfile-based vulnerability assessment and proactive data loss prevention (Proactive DLP)

Why MetaAccess?
The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete.

To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.

Management Team

Meet the members of the OPSWAT management team.

OPSWAT has been awarded the following patents:

Determining Whether a Data Storage Is Encrypted

10,229,069 which issued on March 12, 2019

File Format Validation

United States Patent No. 10,242,189 B1 issued on March 26, 2019

Computer Security File-based Vulnerability Assessment

United States Patent No. 10,116,683 B1 Issued October 30, 2018

Network Access Control with Compliance Policy Check

United States Patent No. 10,063,594 issued on August 28, 2018.

Determining Whether a Data Storage Is Encrypted

United States Patent No. 10,002,083 Issued June 19th, 2018

Computer Security File-based Vulnerability Assessment

United States Patent No. 9,749,349 Issued August 29, 2017

Determining Whether a Data Storage Is Encrypted

United States Patent No. 9,697,367 B2 Issued July 4th, 2017

Determining Whether a Data Storage Is Encrypted

United States Patent No. 9,471,794 Issued October 18th, 2016

Network Access Control with Compliance Policy Check

United States Patent No. 9,288,199 Issued March 15th, 2016

Determining Whether a Data Storage Is Encrypted

United States Patent No. 9,256,635 Issued February 9th, 2016

Determining Whether a Data Storage Is Encrypted

United States Patent No. 9,021,163 B1 Issued April 28th, 2015

Computer Security Vulnerability Assessment

United States Patent No. No. 10,554,681 B2 Issued February 4, 2020

File Security Using File Format Validation

United States Patent No. 10,621,345 issued April 14, 2020