Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/27/2009
10:21 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OPSWAT Releases Metascan, Multiscanning Engine for Antivirus Applications

Metascan leverages seven built-in antivirus engines from AVG, CA, ESET, Norman, VirusBuster, MicroWorld (Kaspersky) and ClamWin

San Francisco, Calif., January 27, 2009-OPSWAT, Inc., the leading provider of endpoint security integration technologies, today announced the release of Metascan, an advanced engine for launching scan requests and obtaining scan results from seven built-in antivirus engines from AVG, CA, ESET, Norman, VirusBuster, MicroWorld (Kaspersky) and ClamWin. The built-in engines may be managed through the options of programmatic interface, Microsoft Management Console (MMC), or the ICAP Protocol.

"As number and sophistication of Internet-based threats grows, many leading organizations are augmenting defense in depth strategies with defense in breadth strategies. For example, by running multiple AV products in parallel," said Andrew Braunberg, Research Director, Enterprise Software and Security for Current Analysis. "Centrally managing these security applications is an increasingly critical component of overall security management capabilities."

Metascan enables IT professionals and software engineers to deploy multi-scanning solutions leveraging seven built-in antivirus engines from AVG, CA, ESET, Norman, VirusBuster, MicroWorld (Kaspersky) and ClamWin. The technology allows users to effectively scan content with multiple antivirus engines.

"No single antivirus application detects any threat every time, you can improve the detection capability of your scanning solution by using Metascan," said Benny Czarny, president and CEO of OPSWAT, Inc. "we're excited to be able to provide customers with a server-level antivirus solution that delivers advanced file and content-filtering capabilities and the use of multiple scan engines. In this way, customers get choice, high-quality performance and the most up-to-date protection possible."

Metascan cuts deployment time and expense by providing an application containing seven antivirus engines and a single interface to manage them all. Metascan can extract many files and file archives (including ISO, ZIP, MSI, etc), and detect over 400 file types including PDF, DOC and EXE formats. Metascan also easily integrates with third-party software and hardware via version 1.0 of the ICAP and an intuitive API.

"After trying several different options and talking with every antivirus vendor we could find, we found that OPSWAT's Metascan perfectly fit our specifications. To date, the solution we developed using Metascan has successfully scanned over 12,000 resumes over a five-month period without infection," said Jeremy Antonini, Web Developer at Rigzone.

OPSWAT is a Microsoft Certified Partner, ISV/Software Solutions. For more information about Metascan, including a complete list of specifications, please visit http://www.opswat.com/metascan.shtml.

About OPSWAT Founded in 2002, OPSWAT is the world leader in development tools and data services that power solutions managing security features of endpoint applications. The company OPSWAT, Inc. also founded OESISOK(tm), an open industry-wide certification program that verifies the interoperability of endpoint security applications with products from market-leading technology vendors. OPSWAT is headquartered in San Francisco, California, with an additional office in Herzliya, Israel.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27187
PUBLISHED: 2020-10-26
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related command...
CVE-2020-7752
PUBLISHED: 2020-10-26
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
CVE-2020-7127
PUBLISHED: 2020-10-26
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
CVE-2020-7196
PUBLISHED: 2020-10-26
The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the ur...
CVE-2020-7197
PUBLISHED: 2020-10-26
SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) 3.7.0.0 is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software 3.7.0.0* U...