Blog Tag: How to

10 Things to Include in Your Employee Cyber Security Policy

November 27, 2017
Author: Randy Abrams, Sr. Security Analyst, OPSWAT. When addressing cyber security threats, insider threats have come to the forefront. Insider threats are one of the leading causes of breaches. However, insider threat does not mean the...

Video: Getting Started with Metascan and Proxy SG

January 22, 2016
Detecting and preventing advanced threats from entering your organization's network requires scanning network traffic. By establishing a proxy server and scanning all traffic going in and out of your network with an advanced anti-malware...

Monitor and Share your Web Application Status Using and Uptime Robot

November 25, 2014 by Yiyi Miao
We recently made a status page available for multiple OPSWAT products, to provide our users with visibility to the availability of the related services for our web applications. We wanted to share a little bit about this status page and...
Tags: How to