Introducing OPSWAT Threat Intelligence Similarity Search Learn More

OPSWAT Certified Security Applications Program, June 2019 update

During the month of June, eleven new antimalware products were certified by OPSWAT at Gold, Silver and Bronze levels, bringing the total number of certified applications for Q2 CY 2019 to twenty four.

#

Certified Product

Level

Category

1

SecureDoc 9.x for Windows

Gold

Encryption

2

F-Secure Client Security 14.x for Windows

Gold

Anti-Malware

3

F-Secure Client Security Premium 14.x for Windows

Gold

Anti-Malware

4

F-Secure Server Security Premium 14.x for Windows

Gold

Anti-Malware

5

Falcon 5.x for Windows (CrowdStrike)

Silver

Anti-Malware

6

Falcon 5.x for Mac (CrowdStrike)

Silver

Anti-Malware

7

Falcon 5.x for Linux (CrowdStrike)

Silver

Anti-Malware

8

Cisco Advanced Malware Protection for Endpoints 1.x for Mac

Silver

Anti-Malware

9

SentinelOne 3.0 for Mac

Silver

Anti-Malware

10

REVE Antivirus 1.x for Windows

Silver

Anti-Malware

11

BitMedic Antivirus 2.x for Mac

Bronze

Anti-Malware


OPSWAT Certified Security Applications Program
ensures CASB, NAC, SSL-VPN, and IDaaS compatibility with the market-leading access control solutions from vendors such as OPSWAT, HP, F5, Pulse Secure, LogMeIn, Palo Alto Networks, Citrix, Cisco and many others, providing compatibility with 100 million endpoints. OPSWAT uses industry-standard criteria and vigorous testing to determine Anti-Malware and Encryption applications’ efficacy, protection capability and compatibility with access control platforms. Over the past decade, altogether close to 6000 enterprise applications have been certified or comprehensively analyzed to provide posture check and compliance assessments.

Learn more about the OPSWAT Certified Security Applications Program and certified solutions, check out the certification criteria, or submit an application for certification.

More importantly, understand how MetaAccess can help ensure endpoint security compliance across a range of cloud deployment use cases.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.