OPSWAT Update – June 2020

Welcome to the OPSWAT Update – your source for news and information on Critical Infrastructure Protection (CIP) and OPSWAT products and services.
OPSWAT Product Spotlight
We recently introduced new / updated products to address several top cyber security challenges, including:
Cloud Security for Salesforce - Now you can secure access to your confidential customer information in Salesforce with MetaAccess. This extension of the MetaAccess platform is available on the Salesforce AppExchange and helps enterprises natively secure device access for compliance and security. This new offering allows deep inspection of any device for security policy compliance before granting access. You can learn more about the new product in the product release announcement. You can also schedule a demo by contacting us.
File Upload Security Assessment - Schedule a call to learn how our File Upload Security Assessment can help review your business needs and map out a comprehensive plan to enhance your security program.
Visit our product release blog to find additional information about all of our recent product releases - including MetaDefender for Secure Storage, MetaDefender Vault, MetaDefender Drive, and the OESIS Framework.
Critical Infrastructure Resources
OPSWAT offers a wide range of educational resources to help you expand your knowledge of cybersecurity trends and best practices. A few recent additions include:
Secure Data Storage Webinar Recording - Watch this webinar to learn how to secure enterprise data storage from malware attacks and mitigate compliance risks. The webinar demonstrates how MetaDefender for Secure Storage delivers a robust layer of protection for securing stored enterprise data – such as documents, videos and images – while also helping prevent data breaches, downtime, and compliance violations in cloud and on-premises storage and collaboration solutions.
Email Security Comparison Guide - Read our guide to find the best email security solution for your business and how MetaDefender Email Gateway Security can enhance your existing email solution by providing advanced threat prevention.
Anti-malware Research Report - Check out our June report for the latest information on the market share of leading anti-malware vendors and products.
You can access other cybersecurity research reports in the OPSWAT Research Center.
File Upload Security Best Practices - Learn 10 tips for securing file uploads from one of our security experts.
CDR Evaluation Guide - Review the top questions and answers you should ask before selecting a Content Disarm and Reconstruction (CDR) technology to help protect your business from cybersecurity attacks.
Channel Partner Program
Over the past few months we have made significant enhancements to our channel partner program, including:
- Higher discounts
- Enhanced deal registration
- Expanded sales tool access via the Partner Portal
- Specialized sales and sales engineer training for F5, A10 and other cybersecurity product integrations
If you are an MSP, VAR or cybersecurity reseller and want to expand your solutions to include OPSWAT, read about the OPSWAT channel program.
Additional Information
Subscribe to the OPSWAT Blog to receive access to regular tips and best practices on cybersecurity along with updates on OPSWAT technology and products.
If you would like additional information about any items in this newsletter, or have other questions, please contact your OPSWAT account manager or request a consultation.

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure