Sony Breach and Email Security: What Can You Do?
In view of Sony’s recent data breach and the ominous warnings from cyber security experts that we can expect a further rise of cyber-attacks in 2015, now is a good time for organizations to review...
View ArticleBulletproof Browsing
Coke or Pepsi, Chevy or Ford, Mossberg or Remington, it seems that a defining characteristic of human nature in capitalistic societies is the magnetization to certain product brands with such a fervor...
View ArticleMalware Spread Via Tor Exit Node
OnionDuke is a piece of malware that is attached to an executable downloaded from certain Tor exit nodes. For those unfamiliar with it, Tor (The Onion Router) is a tool for anonymous web browsing. By...
View ArticleAWS in 2015: Why You Need to Switch from PV to HVM
Until now, most average Amazon (AWS) users could effectively ignore the distinction between paravirtual instances (PV) and hardware assisted virtual instances (HVM). HVM was a technology reserved for...
View ArticleVideos: How to Configure GEARS Auto Updates and Event Logs
In our latest GEARS how-to videos, Product Manger Adam Winn provides easy instructions for configuring automatic updates and event logs based on your preferences. For instance, some GEARS users might...
View ArticleTop Three Ways to Protect Yourself from Ransomware
In a recent article ‘How My Mom Got Hacked’, essayist Alina Simone wrote about how her mother became a victim of the latest form of ransomware: Cryptowall 2.0 (detected by multiple antivirus engines...
View ArticleUsing Metascan and F5 Big IP Appliances to Block Malicious File Uploads
Previously, we have discussed how Metascan® can be used to scan HTTP traffic that is being routed through a Blue Coat proxy server. Routing traffic through a proxy allows an organization to be...
View ArticleNeed Disk Encryption? TrueCrypt is Still One of the Best Options
In mid-2014, to the chagrin of many, TrueCrypt development was discontinued. Considering its popularity and the general response by the public, it was no surprise that within a few months a group of...
View ArticlePolicy Patrol
Email Security and Secure File Transfer with Policy Patrol Policy Patrol is a family of products that helps organizations protect and manage their email communications and file transfers. Policy...
View ArticleRed Earth Software Acquisition
#sub-rightside h3{margin-top: 20px;} #excited_img{float: right;width: 340px;} We are excited to announce that OPSWAT has acquired Red Earth Software, leading provider of email security and secure file...
View ArticleHow to Prevent Attacks on Air Gapped Networks
Air gapped networks are purposely disconnected from the outside internet to prevent malicious actors from accessing critical data. The computers that control critical infrastructures such as power...
View ArticleOPSWAT Acquires Email Security Provider Red Earth Software
OPSWAT, provider of solutions to secure and manage IT infrastructure, today announced the acquisition of Red Earth Software, developer of email security and secure file transfer solutions. The Red...
View ArticleNew OPSWAT Office in Romania
We’re excited to announce the opening of a new OPSWAT office in Romania! With the acquisition of Red Earth Software, we were looking to further expand our development capacity. Our office in Hungary...
View ArticleOESIS is Windows 10 Ready
There was a lot of coverage this week surrounding the new Technical Preview of Windows 10. Microsoft has made some exciting announcements and we are very interested to see what else may be revealed...
View ArticleAntivirus and Compromised Device Report: January 2015
Introduction OPSWAT periodically releases market share reports for several sectors of the security industry. This report includes market share for antivirus applications, as well as compromised device...
View ArticleWhat do GEARS Releases and Road Trips Have in Common?
You probably didn’t know that we name our product releases for GEARS after US states. It has become an amusing way for our team to track progress as we traverse the country, in addition to being a...
View ArticleOESIS Version 4.1.167.0 Released – Adds Windows XP Support
Despite Windows XP having reached end of life status, and generally being unsafe for use [1], it’s still wildly popular. By the numbers, it’s the second most popular desktop operating system –...
View ArticleHow to Build a Global Support Organization
One of my goals over the past few years has been to expand OPSWAT’s support operations to overseas offices in order to better serve customers in their local time zone and to provide 24-hour support...
View ArticleOPSWAT Report Finds at Least 15% of Devices at Risk
OPSWAT today announced the release of their latest market share report, which includes detailed analysis of the market share of antivirus vendors and products. The report also takes a look at the use...
View ArticleGEARS ‘Minnesota’ Released
The New Year is in full swing here at OPSWAT. The GEARS team has been working really hard, and our latest GEARS release includes several exciting new features as well as important performance...
View Article