Event Wrap-Up: AWS re:Invent 2017
The OPSWAT team just got back from AWS re:Invent 2017 in Las Vegas, Nevada. At the event last week, we focused on presenting MetaDefender API integrations with AWS cloud infrastructure, which help keep cloud data secure.
AWS cloud security is an increasingly crucial topic as more and more businesses move their data, applications, and infrastructure to the cloud. OPSWAT makes integrations of its advanced technology with AWS available to help keep organizations secure as they rely more and more on cloud computing, and as Amazon Web Services grows in popularity.

Left: Product Manager George Prichici imparts the benefits of MetaDefender API integrations at the OPSWAT booth
Right: Solutions Engineer Amit Schulman does the same
Throughout the week, we presented how MetaDefender APIs can:
- Secure virtual machines from vulnerabilities and malware
- Protect web applications from malicious traffic
- Analyze and scan Amazon S3 storage for serverless malware protection
MetaDefender REST APIs allow developers to leverage OPSWAT's data sanitization (CDR), multi-scanning, and vulnerability detection technologies in order to detect known and unknown threats and neutralize malicious documents.
CEO Benny Czarny spent some time at re:Invent, along with other OPSWAT team members. Below, they pose at the OPSWAT booth on the expo floor at the Venetian.

Visit our Events page to see our other upcoming events. See this page to learn more about OPSWAT APIs.

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure