API Deep Dive. OESIS Modules

Similar documents
OPSWAT Metadefender. Superior Malware Threat Prevention and Analysis

OPSWAT, Inc. Corporate update

OPSWAT Metadefender. Superior Malware Threat Prevention and Analysis

Miradore Management Suite Application support for Patch Management

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

How to build a multi-layer Security Architecture to detect and remediate threats in real time

Metascan Client. Tony Berning Product Manager

Seqrite Endpoint Security

Managing Patches Using SanerNow. 4.0 User Guide

SOFTTAILOR Package Pool Ready to Deploy Applications (Stand )

Content Quarterly, Q Supported Platforms and Applications

Security Industry Market Share Analysis

Built without compromise for users who want it all

Securing the Modern Data Center with Trend Micro Deep Security

Cyber Essentials Questionnaire Guidance

Security Industry Market Share Analysis

MOBILE SECURITY OVERVIEW. Tim LeMaster

CompTIA A+ Certification ( ) Study Guide Table of Contents

Audit Tools That Won t Break the Bank

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

ExamPrepAway. Latest Exam Guide & Learning Materials

Belarc Product Description

McAfee Endpoint Security

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

A Guide to Closing All Potential VDI Security Gaps

GUIDE. MetaDefender Kiosk Deployment Guide

Securing the SMB Cloud Generation

100% Signatureless Anti-ransomware

Configure Client Posture Policies

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

OptiSol FinTech Platforms

QUALYS SECURITY CONFERENCE Qualys CertView. Managing Digital Certificates. Jimmy Graham Senior Director, Product Management, Qualys, Inc.

HPE Intelligent Management Center

BigFix 2018 Roadmap. Aram Eblighatian. Product Manager IBM BigFix. 14 May, 2018

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

What is a mobile protection product?

ESAP. Release Notes. Release, Build Published Document Version November

Configure Client Posture Policies

Java Manuals For Windows 7 Full Version Latest Antivirus

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

PROTECTION SERVICE FOR BUSINESS. Datasheet

The best for everyday PC users

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October

Qvidian Proposal Automation System Requirements

Web Gateway Security Appliances for the Enterprise: Comparison of Malware Blocking Rates

Data Protection in Practice

Cisco Advanced Malware Protection (AMP) for Endpoints

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

AS Stallion. Security for Virtual Server Environments. Urmas Püss

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Configure Posture. Note

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Content Quarterly, Q Supported Platforms and Applications

Comodo Endpoint Security Manager Business Edition Software Version 2.0

CISSP - Certified Information Systems Security Professional

MALWARE EFFECTIVENESS Q:

How To Remove Internet Security Pro Virus. Manually >>>CLICK HERE<<<

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

SYSTEM REQUIREMENTS M.APP ENTERPRISE

100% Endpoint Protection dank Machine Learning, EDR & Deception?

Symantec Endpoint Protection Family Feature Comparison

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

The Laws of Vulnerabilities: Patching Progress and how to Expedite It

Integrating Metascan and CyberArk

Cyber Security. Our part of the journey

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

MRG Effitas 360 Degree Assessment & Certification Q1 2018

THE RISE OF GLOBAL THREAT INTELLIGENCE

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

CompTIA A+ Accelerated course for & exams

AT&T Endpoint Security

Configure Client Posture Policies

Understanding Network Access Control: What it means for your enterprise

PCI DSS Compliance. White Paper Parallels Remote Application Server

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Enterprise Guest Access

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Top Qualities of an Enterprise-Class Isolation Platform

Sophos Central Admin. help

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Tenable.io User Guide. Last Revised: November 03, 2017

Network Security. Multi-Layer Approach to Security. Protection, Detection, and Remediation. Clay Ostlund Business Development Manager

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Content Quarterly, Q Supported Platforms and Applications

Supported platforms and applications for Miradore patch management

ForeScout ControlFabric TM Architecture

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

MRG Effitas 360 Assessment & Certification Programme Q4 2015

pcmatic.com/msp THE WORLD NEEDS BETTER SECURITY. WE GOT IT

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

SonicWall Capture Client 1.0. Operations

Cisco Secure Access Control

Exam Questions

Datacenter Security: Protection Beyond OS LifeCycle

KEEP YOUR BUSINESS SECURE WITH ESET. Proven. Trusted.

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Securing Today s Mobile Workforce

ANATOMY OF AN ATTACK!

PND at a glance: The World s Premier Online Practical Network Defense course. Self-paced, online, flexible access

Transcription:

API Deep Dive OESIS Modules

Agenda What is OESIS Build Endpoint Security Features with OESIS API OPSWAT Certified Security Applications Program Roadmap Additional Resources Q & A

What is OESIS Endpoint management SDK that enables customers to build security features Vulnerability Assessment Report 1,000,000+ vulnerable binaries from 15,000+ application versions Infection Detection Indication of comprise, quickly assess system security using 3 OPSWAT unique technic Peripheral Management Monitor and manage portable media device, block / unblock USB device and etc. Application Removal Silently remove 1,200+ applications including toolbars, ransomware and etc. Device Compliance Detect, classify and manage 5,000+ security applications

License OESIS Framework and many more.

Build Endpoint Security Features with OESIS 200M+ Endpoints managed 5,000+ Third-party applications from 800+ vendors 140,000+ APIs supported

Build Endpoint Security Features with OESIS Vulnerability Assessment Infection Detection Peripheral Management Application Removal Device Compliance

Vulnerability Assessment Product name OPSWAT Leading solution in the market Product name Use 7-Zip case: I want to check whether v there x are known Notepad++ vulnerabilities on my system v or in xthe ActivePerl v x data that is being brought to my network. Adobe AIR v v Adobe Flash Player v v Beyond Compare v x Cisco AnyConnect VPN Client v v ESET Endpoint Security v x FileZilla v x Google Chrome v v Internet Explorer v v Microsoft Excel v v Microsoft Filemon x v Microsoft Lync v v Microsoft OneNote v v Microsoft Outlook v x Microsoft PowerPoint v v 250+ Microsoft top Process vulnerable Explorer applications x v Microsoft Publisher v v 10,000+ Microsoft Regmon associated CVE with x severity v information Microsoft Visio v v 1,000,000+ Microsoft Word identified vulnerable v hashes v Microsoft XML Core Services (MSXML) x v 30+ Mozilla times Firefox faster than existing v solutions v on the market OPSWAT Leading solution in the market Oracle Java JRE v v Paint.NET v x PuTTY v v QQ v x Secunia PSI v v Silverlight v v Skype v x TeamViewer v x TortoiseGit v x TortoiseSVN v x VLC media player v v vsphere Client v x Windows Defender v x Windows Firewall v x Windows Media Player v x Windows Update Agent v v Windows VPN Client v x WinPcap v x WinRAR v v WinSCP v v Wireshark v v Zoom v x

Infection Detection Use case: I want to quickly verify whether my system is compromised. Scan memory components With Metadefender server or our cloud Validate connected IPs Against 13 cloud IP reputation engines Search for repeated threats From local installed antimalware solution

Infection Detection

Infection Detection Scan memory components With Metadefender server or our cloud

Infection Detection Validate connected IPs Against 13 cloud IP reputation engines

Infection Detection Search for repeated threats From local installed antimalware solution

Peripheral Management Use case: I want to block any USB that is connected to my device until the data on it is examined. OESIS BLOCK ACCESS EXAM THE DATA UNBLOCK MEDIA

Application Removal Use case: I want to automatically remove all the unwanted applications, I want to uninstall my legacy security application prior to install the new one. Support for Endpoint Security Suites Support for Potentially Unwanted Applications Silent uninstall without user interaction Even when end-users have forgotten their passwords Even if a prior manual uninstall attempt failed to complete Even if product self-protection enabled

Device Compliance Use case: I want to know what kind of applications are running on my system/on my network. Signature base and system generic detection 500+ applications detected on a physical device on average 300+ applications analyzed and labeled Potentially unwanted applications, ransom ware, etc. 15 different security categories Fast response and small memory footprint Same size as msprint.exe, 30% of any browser instance

Challenge from BYOD Bring Your Own Device 16

Device Compliance Use case: I want to ensure end-user s own device is compliant before connecting to my network. Retrieve application status information What is anti-malware protection state, virus definition, last scan time, and threat history Which drive volume is encrypted Whether system has missing patches Apply remediation based on security policy Trigger full-system scan Update malware definitions Install missing patches And 100+ more unique feature APIs

Supported Applications

Auto Update Always up to date with hands-free solution Reduce discrepancy due to release frequency Continuous delivery Specific OESIS versions deployed based on your choosing Flexibility to roll back any time

Integrating to Metadefender Product Family

API C-JSON I/O Plug and play modules allow you to only deploy the components you need Flag JSON I/O, can be integrated with C++, C#, Ruby, Java, Python, PHP, and nearly any programming/scripting languages Detail sample code and developer guide allows for complete integration within three hours from the start

OESIS Real World Deployment

OPSWAT Certified Security Applications Program Quality False Positive Compatibility

Gold Certification Quality False Positive Compatibility Ensure solutions pass security auditing AV-TEST AV-Comparatives Weed out rogue security applications Reduce false positive alarms Eliminate unnecessary operation slowdown Guarantee compatibility with leading CASB, NAC, SSL-VPN technologies Reduce support costs due to security policy incompatibility

OPSWAT Market Share Report

Roadmap Features Support for open source Linux projects based on OESIS Report vulnerabilities on system binaries and hardware drivers Support for Windows phone and more IoT Android Wear Apple Watch and Apple TV Amazon Echo Dot NFC rings

Additional Resources API documentation: http://software.opswat.com/oesis_v4/html/ Support charts: https://software.opswat.com/oesis_v4/win/docs/support_charts/support_charts.html https://software.opswat.com/oesis_v4/mac/docs/support_charts/support_charts.html

Jianpeng Mo Senior Director of Software Engineering Thank You! O 415.590.7300 F 415.590.7399 C 510.610.7208 E jianpeng@opswat.com 398 Kansas St. San Francisco, CA 94103 www.opswat.com