Editing OPSWAT

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
 
[[wikipedia:OPSWAT]] is a cybersecurity company founded in 2002 based in San Francisco, CA, they focus on [[cyberthreat]] prevention including a focus on malware, sensitive information, and application vulnerabilities.
 
[[wikipedia:OPSWAT]] is a cybersecurity company founded in 2002 based in San Francisco, CA, they focus on [[cyberthreat]] prevention including a focus on malware, sensitive information, and application vulnerabilities.
  
 
== History ==
 
In 2004, OPSWAT launched their first product, the [[OESIS]] Framework SDK, aimed at enabling software engineers and technology vendors to develop products to secure and manage endpoints, and detect and manage third-party software applications.
 
 
In 2006, the company released [[MetaDefender]], which detects and prevents cybersecurity threats in data that originates from a variety of sources, including email, [[BYOD]], the cloud, and web portals. This was later expanded to [[MetaDefender Content Security]], a platform for [[DevOps]] and [[SecOps]] aimed at providing protection alongside existing security solutions. This was also expanded to cloud technology.
 
 
In 2014 the company launched [[MetaAccess]], which prevents risky devices from accessing local networks and cloud applications.
 
 
OPSWAT released MetaDefender Drive in 2018, which improves device trustworthiness for organisations, by inspecting any file on the device for a range of forms of vulnerability or risk.
 
 
In 2018 the company's Content Disarm Reconstruction (CDR) technology was ranked number one by the US Government out of five similar vendors
 
 
 
== Products ==
 
The company offers a range of technologies as part of its services, including:
 
 
* Central Management - multiple product management.
 
* [[MetaDefender Kiosk]] - isolated network threat protection.
 
* [[MetaDefender Vault]] - secure file transfer and storage technology.
 
* [[MetaDefender Email]] Security - protection that secures against risks not detected by other methods deployed by Office 365 and G Suite.
 
* [[MetaDefender ICAP]] - network appliance integration technology.
 
* OPSWAT Agent - a free malware analysis tool available.
 
* OPSWAT Certification Program - establishing compatibility of endpoint security applications, based on 100 endpoint security application vendors who participate, protecting 100 million devices through access control and zero trust vendor solutions.
 
* OESIS Framework SDK - a solution for OEM customers which integrates the company's advanced endpoint security features for 100 million endpoints.
 
  
 
* [[OPSWAT MetaDefender]]
 
* [[OPSWAT MetaDefender]]
  
== Office locations ==
 
OPSWAT is headquartered in the Potrero Hill district of San Francisco.[citation needed]
 
 
OPSWAT also has other office locations in:
 
 
* Ho Chi Minh City, Vietnam
 
* Veszprém, Hungary
 
* Timișoara, Romania
 
* Tokyo, Japan
 
* Taipei, Taiwan
 
* Kingston Upon Thames, Surrey, England
 
 
 
== Related terms ==
 
* [[GlobalProtect]] [[HIP]]<ref>https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLSYCA4</ref>
 
 
== See also ==
 
* {{Security}}
 
  
  
[[Category:Security]]
+
{{Security}}

Please note that all contributions to wikieduonline may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Wikieduonline:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

Template used on this page:

Advertising: