Type to search
Analyze a fileFree Tools

Blog: endpoint security

Improved Malware Detection or Data Privacy? How to Have BothFuture post

A cyber security firm made some serious allegations about Carbon Black's Cb Response product leaking data. But the issue was with VirusTotal, not Carbon Black.

read more

OPSWAT Partners with AV-TEST and AV-Comparatives for Enhanced Certification Program

OPSWAT partners with AV-TEST and AV-Comparatives as part of its enhanced Certified Security Applications Program. The new partnerships add to OPSWAT’s Certified Security Application Program’s compatibility tests to certify application’s detection quality, as well as OPSWAT’s tests for false positive responsiveness.

EGS Uses Metadefender Endpoint Management to Keep Remote Employee Devices Safe

As a company with more than 42,000 associates, EGS (Expert Global Solutions) was presented with a challenge that is encountered by many large companies - how to secure endpoint devices used by remote employees. EGS makes use of Workspace virtualization from RES Software (a form of virtual desktop infrastructure) for remote workers. They needed a way to prevent risky or compromised computers from accessing the virtual workspace. Employee-owned devices, especially when used remotely, are very difficult to monitor and secure. Employers do not want to directly manage these devices, but they are still liable for any breaches they may cause.

Video: OESIS Vulnerability Assessment Module Future post

Adam Winn, Senior Product Manager at OPSWAT, demonstrates the OESIS Vulnerability Assessment Module. OESIS is a cross platform SDK that is designed to help developers create products to secure endpoints in NAC, SSL-VPN, and other endpoint assessment solutions. Watch the demonstration to see how quickly the module can scan devices for applications that need to be updated or removed.

read more

Considerations for Effective Endpoint Security

As BYOD continues to grow, organizations will have to focus more resources on the protection of endpoint devices. Here are several considerations to keep in mind when choosing an endpoint security solution. 

The Changing Face of IT Security

As the IT security landscape continues to grow and change, Benny Czarny, CEO and Founder of OPSWAT, shares his thoughts on the current state of the industry, and what he expects to see in the future. 

Video: How Gears Checks Compliance with Check PointFuture post

OPSWAT and Check Point Software Technologies have partnered to enhance security for devices and data. With the partnership comes advanced posture checking for managed and unmanaged devices. Gears admins can configure compliance policies based on their own custom needs that must be met before a user can access the network.

read more

Unpatched Software Vulnerabilities a Growing Problem

Enterprise assets face a high level of risk because visibility to unpatched software vulnerabilities remains weak, leaving companies exposed to sophisticated and stealthy cyber-crime attacks. 

read more

Sorry Symantec - Antivirus Is Not Dead

Each time someone reports that antivirus is dead, a hacker gets his wings (and I get furious). With our industries becoming increasingly data-driven, the need to protect our networks, devices, and archives has become more important than ever. In a world of weaponized emails and polymorphic, self-replicating malware, entertaining the idea that endpoint antivirus protection is dead is both ignorant and dangerous.

read more

10 Things to Include in Your Employee Cyber Security PolicyFuture post

When addressing cyber security threats, human error is a factor that is often overlooked. However, according to the 2014 IBM Cyber Security Intelligence Index, over 95% of all incidents investigated involved human error. Although human error can never be eliminated entirely, incidents can be reduced by establishing clear cyber security guidelines and providing regular employee trainings.

read more

Follow Us

Get our latest research and news in your inbox monthly