OPSWAT Update – February 2021
February was an exciting month at OPSWAT with the introduction of several new products and resources. A few highlights are summarized below:
OPSWAT News
OPSWAT Expands Global Availability of Critical Infrastructure Protection Solutions to More than 40 Countries
To support global customer demand, OPSWAT has enhanced our channel partner program with additional resellers and new tools, training and account management resources to help global companies protect against growing threats to critical infrastructure making it one of the largest channel partner programs focused on critical infrastructure protection in the world.
OPSWAT Cybersecurity Academy Updates
OPSWAT Expands Cybersecurity Training Program to Address Skill Gaps for Critical Infrastructure Protection (CIP) Professionals
Since it was established in September of 2019, OPSWAT Academy has enrolled more than 2,500 students in its cybersecurity training and certification program focused on protecting critical infrastructure and has plans to expand its courses in 2021.
Developed for cybersecurity professionals and CIP stakeholders, OPSWAT Academy offers 13 modules on critical infrastructure and provides a wide range of free beginner, intermediate and advanced courses designed to reflect the real-world responsibilities and technical proficiencies required of critical infrastructure security professionals.
Learn more and enroll for free
New Academy Courses Coming Soon!
Based on feedback we have received from the OPSWAT Academy community, we are happy to announce that we are introducing a new series of courses on Critical Infrastructure Protection best practices, terminology, and concepts.
The first course in this series will be released at the end of February. This course is an introduction to Process Control Environments of Critical Infrastructure Protection, with a focus on Operational Technology (OT). In this course, the student is introduced to how OT relates to IT, as well as concepts within OT like ICS, SCADA, PLC, and IIOT – as well as OT Protocols and associated devices. After terms and concepts are addressed, the student then learns about SCADA design concepts and best practices to enhance SCADA cybersecurity.
Cybersecurity News
How to securely transfer your data to cloud storage
Several factors have been major accelerators to move or backup storage data from NAS (Network Attached Storage) to the Cloud in 2020 including Covid-19, WFH and cyber-attacks such as Sunburst SolarWinds.
Learn how MetaDefender for Secure Storage provides an efficient way to securely transfer your data to cloud storage and prevent zero-day attacks by scanning cloud storage continuously and on-demand, transferring large amounts of data from On-Prem storage to Cloud storage - while scanning it with more than 30 anti-malware engines for known malicious payloads, file vulnerability checks, and more.
Avoid storage data leaks and PII regulation non-compliance
A recent data breach at a large clothing retailer led to the exposure and leakage of private data of 7 million end-users. Threat actors hacked into a backup file stored on a 3rd party cloud platform and stole critical PII (Personally Identifiable Information) data like credit card numbers, encrypted passwords and history, contact information – (e.g., addresses, phone numbers). This stolen information was then shared online where other hackers could use it to target more sites.
See how MetaDefender for Secure Storage can help you secure and protect your mission critical data (whether stored in the cloud or on-premises) and meet regulatory compliance requirements.
OPSWAT Product Spotlight
MetaDefender Core v4.20.0 Release
A brand-new shared database design was released in MetaDefender Core v4.20.0. Users can now use a single PostgreSQL database server for all MetaDefender Core instances within their network.
This new feature automatically synchronizes all settings (except Single-Sign-On), workflow rules, processing history, quarantine, statistics data, update history and config history on all MetaDefender Core instances. Users will get comprehensive visibility with combined data from all MetaDefender Core instances by switching from single-instance mode to multiple-instance mode.
MetaDefender Core: Engines and OS Support Updates
Due to the End of Life (EOL) of Windows 7, 8, and 8.1; Centos 6+; and RedHat 6+; MetaDefender Core will stop supporting these operating systems (OS) from March 1, 2021. Using MetaDefender Core on older, unsupported operating systems may cause performance and reliability issues over time. It is highly recommended to upgrade your systems to a supported operating system.
MetaAccess Support for TLS 1.0 and 1.1 Ending
OPSWAT continuously updates our products to stay up to date with the latest technology, security, and industry best practices. As of March 31, 2021, MetaAccess will drop support for TLS 1.1 and TLS 1.0.
If you are using an older OPSWAT Client version and do not update to TLS version 1.2 (or later) by March 31, 2021, those devices running the older OPSWAT Client will stop working.
MetaDefender Drive v3.8.0 Release
Many Organizations use MetaDefender Drive to securely control the process of devices entering and leaving their critical networks and address transient device issues with air-gap networks. This portable USB stick can boot, scan and inspect devices for malware, vulnerabilities and compliance issues that other solutions may have missed.
The most recent MetaDefender Drive v3.8.0 release highlights:
- Users can copy/backup their clean documents and files into another USB storage device after scanning
- Proven to scan millions of files 10 percent faster than the previous version
- The event log and navigation bar have been improved with more information for a better user experience
- Users will be able to view the attached local drives and unlock them any time
Critical Infrastructure Resources
Advanced Cyber Threat Protection for Financial Services
Financial services are the most cyber-attacked sector. The rapid growth in demand for anytime / anywhere access to financial information has led to the digitization of financial data. This makes it a lucrative target for cyber criminals who steal credit card information, money from bank accounts, or confidential data that they can sell or hold for ransom. It has even become a weapon in modern warfare and espionage to destabilize financial markets.
Discover the best ways to prevent malicious file uploads while still allowing legitimate users to upload and share files to web applications by downloading our complimentary Whitepaper.
Energy Sector Case Study
Read about why a major US energy company turned to OPSWAT to implement a consistent process for securing 10+ critical networks by eliminating the risks resulting from vulnerabilities, malware and zero-day attacks. By implementing MetaDefender® Kiosks and MetaDefender Vault to secure the transfer of files into and out of their critical infrastructure, the company meets existing and emerging NERC CIP regulatory requirements.
To access other resources, including Whitepapers, datasheets and new case studies visit OPSWAT CIP Resources.
Additional Information
Subscribe to the OPSWAT blog to receive access to regular tips and best practices on cybersecurity along with updates on OPSWAT technology and products.
If you would like additional information about any items in this newsletter, or have other questions, please contact your OPSWAT account manager or request a consultation.
Best Regards,
Team OPSWAT

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure