How Upwork Eliminated Zero-Day File Attacks with MetaDefender

Presented by

Teza Mukkavilli, Head of Information Security at Upwork

About this talk

Join OPSWAT for an online fireside chat with Teza Mukkavilli, Head of Information Security at Upwork, a leading online freelancing site. Learn how Upwork addressed the threat of zero-day or unknown threats hidden in file uploads. Review how Upwork leverages MetaDefender data sanitization/Content Disarm and Reconstruction (CDR) and multi-scanning technology for advanced threat prevention.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (1469)
Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up. To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device. Why MetaDefender? Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect. That's why our advanced threat prevention platform, MetaDefender, is not only based on detection. MetaDefender uses OPSWAT's unique data sanitization (Content Disarm and Reconstruction) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements data sanitization with multi-scanning and vulnerability assessment. Why MetaAccess? The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete. To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.