Quantcast
Channel: EN Blog
Browsing all 2151 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Understanding Heuristic-based Scanning vs. Sandboxing

Most people who work in the anti-malware industry are familiar with signature-based detection, where if a file is determined to be malicious, a signature is written so anti-malware programs are able to...

View Article


Image may be NSFW.
Clik here to view.

How Unidirectional Networks Are Used in Industrial Control Systems

Unidirectional networks, also commonly referred to as data diodes, unidirectional gateways, and cross-domain solutions, are a class of networking tools which allow for data to flow in a single...

View Article


Image may be NSFW.
Clik here to view.

Volunteers From OPSWAT's Romania Office Teach Free Summer Programming Lessons

Volunteers from our office in Timisoara, Romania, have been given the opportunity to teach week-long programming classes to a group of students, ages 12-17 years old, during their summer break....

View Article

Image may be NSFW.
Clik here to view.

Metascan Now Supports Linux With Enhanced Security and Scalability

OPSWAT, provider of solutions to secure and manage IT infrastructure, today announced the next generation of Metascan®, that can be deployed on Linux. Metascan is a multi scanning solution for ISVs, IT...

View Article

Image may be NSFW.
Clik here to view.

EGS Uses Gears to Keep Remote Employee Devices Safe

As a company with more than 42,000 associates, EGS (Expert Global Solutions) was presented with a challenge that is encountered by many large companies - how to secure endpoint devices used by remote...

View Article


Image may be NSFW.
Clik here to view.

Webinar: Introducing Metascan for Linux!

We are excited to announce that Metascan® now supports Linux systems! Join us as OPSWAT's Szilard Stange demonstrates the newly released Metascan version for Linux in this webinar. Metascan technology...

View Article

Image may be NSFW.
Clik here to view.

AV Engines Inconsistent in Detecting Malware On Top Downloads

Certain sites have a reputation for being safe from malware. CNET’s Download.com is such a site; most people assume files hosted on that site are malware free. We decided to do a quick test of that...

View Article

Metascan Mail Agent Now Compatible with Non-Exchange Servers

We are excited to announce the latest release of Metascan®, 3.9.2, which is now available for download on the OPSWAT Portal. With this release, we enhanced the Metascan Mail Agent to support any SMTP...

View Article


Image may be NSFW.
Clik here to view.

Webinar: What's New in Metadefender?

Wondering what new features you’ve been missing in Metadefender? Our Senior Product Manager, Tony Berning, will be covering the latest features and enhancements added to the Metadefender kiosk. The...

View Article


Image may be NSFW.
Clik here to view.

Radisson Uses Policy Patrol to Fulfill Legal and Branding Requirements

Radisson Edwardian Group consists of 13 luxury hotels in central London, Heathrow and Manchester, providing luxury without pretension. The hotel faced two challenges with regards to their email...

View Article

Image may be NSFW.
Clik here to view.

Re-Blog: Three Questions You Should Ask Security Vendors

Before the 2015 RSA Conference back in April, Rafal Los wrote a piece titled, “Three Questions You Should Ask Security Vendors,” in which he covers questions people should ask while attending the...

View Article

Image may be NSFW.
Clik here to view.

Gears Automatically Prompts Users to Resolve Issues

We just released a new version of Gears! If you haven't been following our roadmap across America, it isn't too late to get up to speed on all of our new features. In this month's release, code name...

View Article

Image may be NSFW.
Clik here to view.

Policy Patrol Secure File Transfer Version 2.1 Released

At OPSWAT, we are continually working to improve our products to help companies enhance their security while completing daily tasks more efficiently. We are happy to announce the latest release of our...

View Article


Image may be NSFW.
Clik here to view.

3 Reasons Why the Nuclear Industry is a Good Cyber-security Example

I recently attended a workshop for the Nuclear Information Technology Strategic Leadership (NITSL) in Minneapolis, MN. The focus of the workshop was to discuss IT-related issues in the nuclear industry...

View Article

Image may be NSFW.
Clik here to view.

Avoid Data Compliancy Fines with Secure File Transfer and Audit Logging

OPSWAT, provider of solutions to secure and manage IT infrastructure, today released a new version of Policy Patrol Secure File Transfer, an advanced file transfer solution that allows users to send...

View Article


Image may be NSFW.
Clik here to view.

Infographic - Phishing and Spear Phishing: What do you need to know?

It seems like phishing and spear phishing are constantly in the news, usually accompanied by an announcement of yet another major data breach! The first recorded phishing event occurred in the...

View Article

Image may be NSFW.
Clik here to view.

July in Review

We're deep in the heat of summer, and we'll be journeying into the heart of the Nevada desert next week for Black Hat - Las Vegas. It's been a busy month for us with seven product releases, the launch...

View Article


Image may be NSFW.
Clik here to view.

The Hard Rock Uses Policy Patrol to Promote Brand

The Hard Rock Hotel & Casino wanted a consistent look for their corporate correspondence with customers, vendors, partners, legal teams, and other hotels and casinos. The challenge was to come up...

View Article

Image may be NSFW.
Clik here to view.

Webinar: Introducing Metascan for Linux!

We are excited to announce that Metascan® now supports Linux systems! OPSWAT's Szilard Stange demonstrates the newly released Metascan version for Linux in this webinar. Metascan technology increases...

View Article

Image may be NSFW.
Clik here to view.

What Can IT Departments Learn From Hacking Team's Leaked Emails?

Among the revelations coming out of the massive data dump from the Hacking Team breach include emails showing that the FBI purchased services and products from Hacking Team for the purpose of...

View Article
Browsing all 2151 articles
Browse latest View live