OClawVPS.com
OPSWAT
Edit

OPSWAT

http://www.opswat.com/
Last activity: 10.04.2026
Probably Closed
Categories: CybersecurityDefenseEnergyTechFinTechHardwareHealthTechInfrastructureManufacturingServiceTechnology
OPSWAT protects critical infrastructure. Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise. That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance.

OPSWAT. Trust no file. Trust no device.

www.opswat.com

Visit us on Twitter, Facebook, Instagram, and YouTube.

http://www.twitter.com/opswat
http://www.facebook.com/opswat
https://www.instagram.com/opswat
https://www.youtube.com/user/opswat1
Followers
11.62K
Mentions
62
Location: Romania
Employees: 501-1000
Total raised: $125M
Founded date: 2002

Investors 1

Funding Rounds 1

DateSeriesAmountInvestors
31.03.2021-$125MBrighton P...

Mentions in press and media 62

DateTitleDescription
10.04.2026OPSWAT launches AI file screening engine for MetaDefender-
15.01.2026Heimdal Achieves OPSWAT Gold Certification for Anti-MalwareCOPENHAGEN, DENMARK, January 15, 2026 /EINPresswire.com/ -- Heimdal today announced that its Next-Gen Antivirus (NGAV) with Extended Threat Protection (XTP) has achieved OPSWAT Gold Certification for Anti-Malware, validating its compatibili...
22.12.2025Кибербезопасность на грани сингулярности: шансы на выживание в ИИ-войнеИскусственный интеллект находит все более широкое применения для автоматизации и оптимизации кибератак. Средства ИИ позволяют злоумышленникам генерировать вредоносный код, анализировать системы и обходить системы защиты, по минимуму привлек...
22.11.2025Breaking Cybersecurity Threats Targeting the Construction Industry: November 2025 UpdateShare Share Share Share Email By Charles Swihart, Founder and CEO of Preactive IT Solutions, November 21, 2025 The construction and engineering sectors continue to face escalating cybersecurity risks in late 2025, with ransomware and supply...
04.09.2025OPSWAT Report Finds Insider Threats Driving Breach CostsA new study from critical infrastructure protection firm OPSWAT reveals that organisations face escalating risks from insider activity, legacy tools, and the growing complexity of AI. Independently conducted by Ponemon Institute, the report...
20.08.2025Macs May Not Be Safe from Modern MalwareTL;DR: Protect your Mac with a SiyanoAV Antivirus Pro Lifetime Subscription on sale for $59.99 (reg. $387). Keeping your Mac protected and performing at its best shouldn’t require constant attention. If you value clean design, reliable perf...
06.08.2025Cyber-crime Costs to Hit $1.2tn in 2025, New Report WarnsCritical infrastructure cybersecurity firm OPSWAT has published its inaugural Threat Landscape Report, revealing key findings from over 890,000 sandbox scans conducted over the past 12 months. The report highlights a 127% rise in malware co...
26.06.2025OPSWAT and SentinelOne Enter OEM Partnership to Further Strengthen Multi-Layered Malware Detection with AIOPSWAT, a global leader in critical infrastructure protection, and SentinelOne today announced their OEM partnership with the integration of SentinelOne’s industry-leading AI-powered detection capabilities into OPSWAT’s Metascan™ Multiscann...
06.03.2025Bridging the AI Training Gap: A Call to Action for OrganizationsIn the rapidly evolving landscape of artificial intelligence (AI), a chasm is forming between leadership confidence and employee readiness. A recent report from Corndel reveals a startling disconnect. While leaders exude confidence in their...
04.03.2025Over half of organizations experience incidents involving industrial control or operational techOver the past year, more than 50 percent of organizations have experienced at least one security incident involving ICS/OT systems. Among the top vulnerabilities exploited are internet-accessible devices (33 percent) and transient devices (...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In