Hi [[ session.user.profile.firstName ]]

OPSWAT

  • Date
  • Rating
  • Views
  • Trust no device: how to achieve device security and compliance.
    Trust no device: how to achieve device security and compliance.
    Yiyi Miao, VP of Products & Mike Goldgof, VP of Marketing - Opswat Recorded: Oct 26 2018 40 mins
    As more web applications move to the cloud and more unmanaged devices access corporate resources, the network perimeter has all but disappeared. Yet most existing solutions have been designed to work with traditional network infrastructure. The result is increased data breaches. Learn from domain experts at OPSWAT about how the new Zero Trust model applies to device visibility and control, and how organizations must adapt their security policies to mitigate the risks associated with a perimeter-less network, including corporate data leakage, data privacy and regulatory compliance.

    In this session you will learn:

    1.How security for the perimeter-less network differs from traditional networks – Why are traditional security policies no longer effective with the rise of bring-your-own-devices (BYOD) and the use of cloud solutions?

    2.The top six security challenges in a perimeter-less network – Using real-word examples, we will share the top six security challenges of perimeter-less networks, including endpoint misconfiguration, vulnerabilities, device ownership and malware.

    3.The practical steps that organizations can take to mitigate these security risks – We will discuss policies and technologies that organizations can harness to secure access to corporate data in a perimeter-less network.
  • PRACTICE
    PRACTICE
    Mike Goldgof Recorded: Oct 25 2018 30 mins
  • PRACTICE
    PRACTICE
    John Alexander Recorded: Oct 25 2018 3 mins
    PRACTICE 10_25_2018 v1
  • F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications
    F5 & OPSWAT Webinar: Preventing Cyber Attacks on Web Applications
    Mark Campbell – Security Product Marketing, F5 Networks and George Prichici – Director of Product Management, OPSWAT Recorded: Aug 28 2018 61 mins
    In this webinar, security experts from F5 Networks and OPSWAT will share real-world examples on how cyber criminals can launch advanced attacks through web applications and how to stop them. The most critical web application security risks will be discussed, including file-borne threats on web applications and the joint F5 & OPSWAT solution that addresses these threats. The webinar will include a demo of a simulated web attack.

    After attending this webinar, you will be able to:

    - Identify the most critical web application security risks
    - Understand the best practices for web application security
    - Establish prevention for file-borne threats on web applications
  • Defending the Castle – Back to the Future using Isolated Networks
    Defending the Castle – Back to the Future using Isolated Networks
    John Alexander, Director of Product Marketing, OPSWAT Recorded: Aug 16 2018 58 mins
    In industries where extreme security is a requirement, like the nuclear, energy, manufacturing, financial, and defense industries, an air gapped network can be an extremely powerful defense. Air gapped networks are like dealing with the past and present at the same time: they harken back to a time before the Internet, but they are also even more useful now because of the Internet, which provides a path for both good and bad activity.

    In this presentation, we’ll discuss the concept of the air gap, or isolated network, and explain what their weaknesses are and when they should or shouldn't be used. We’ll also discuss how, when used correctly, an air gapped network can be such a powerful defense.

    Even though air gaps are extremely powerful defense mechanisms, every defense has its weakness. The key is to minimize these weaknesses by establishing a secure work flow that at the same time reduces the operational productivity concerns that surround air gapped networks. The latter portion of this presentation covers one of the most critical defense measures that is required in an air gap network, "the Kiosk", and best practices in employing "kiosks" as a critical part of an air gapped network defense strategy. We’ll also talk about data diodes, and how they can be employed to help reduce the operational cost of using an air gapped network.
  • Securing IoT: Trust No Thing
    Securing IoT: Trust No Thing
    Jianpeng Mo - VP of Engineering at OPSWAT & Deborah Galea – Security Evangelist at OPSWAT Recorded: Jun 13 2018 44 mins
    As IoT devices are increasing in popularity, so are IoT cyberattacks. In this Webinar we will describe the characteristics of IoT Advanced Persistent Threats (APTs), discuss the specific challenges of IoT cyberattacks, and provide recommended defense strategies for the IoT environment.

    The following topics will be covered:

    • Recent IoT Security Incidents
    • Reasons for IoT Attacks
    • IoT Security Challenges
    • The IoT Kill Chain
    • Addressing IoT Firmware Vulnerabilities
    • Preventing Threats in IoT Data and Files
    • Securing IoT with OPSWAT


    About the Speakers:

    Jianpeng Mo - VP of Engineering at OPSWAT
    Jianpeng leads OPSWAT development teams for device compliance management solutions. He has been granted 6 U.S. patents for device encryption, network access control, and vulnerability assessment technologies.

    Deborah Galea – Security Evangelist at OPSWAT
    Deborah is a seasoned enterprise cybersecurity expert with 20+ years of experience in the industry and is dedicated to identifying solutions that help companies of all sizes secure the data workflow in their organization. Prior to joining OPSWAT, Deborah co-founded Red Earth Software, a company that specialized in email security solutions for Microsoft Exchange Server.
  • How Upwork Eliminated Zero-Day File Attacks with MetaDefender
    How Upwork Eliminated Zero-Day File Attacks with MetaDefender
    Teza Mukkavilli, Head of Information Security at Upwork Recorded: Sep 21 2017 27 mins
    Join OPSWAT for an online fireside chat with Teza Mukkavilli, Head of Information Security at Upwork, a leading online freelancing site. Learn how Upwork addressed the threat of zero-day or unknown threats hidden in file uploads. Review how Upwork leverages MetaDefender data sanitization/Content Disarm and Reconstruction (CDR) and multi-scanning technology for advanced threat prevention.

Embed in website or blog