About
I started OPSWAT because I saw a dangerous gap in how the world protects critical…
Articles by .Benny
Activity
38K followers
Experience
Education
-
Technion-Machon Technologi Le' Israel
-
-
Licenses & Certifications
Publications
-
Five Steps to Securing Data Workflows in Your Organization
OPSWAT
See publicationhow can you implement a secure data workflow in your organization? This post shows the five steps involved in the secure data flow planning process.
-
4 Things to Consider When Assessing Device Posture for Effective Network Access Control
Malwarebytes
See publicationHaving a NAC solution in place is important if you want to keep your network and private data secure. However, remember to take a look beyond just whether a user has the required security applications installed. Take the extra step to perform a quality check – not all security applications are created equal.
-
Secure Data Workflow
OPSWAT
See publicationAn overview of common data security challenges facing businesses, with suggestions for organizations looking to secure the flow of data within their network, but not sure where to start. Topics include best practices for detecting and preventing threats. Presented at ITpro EXPO 2014 in Tokyo, Japan.
-
Introduction to Malware
OPSWAT
See publicationA discussion of the history and theory of malware, plus the challenges in detecting it. Presented at San Francisco State University.
-
The Value of Multi-scanning
OPSWAT
See publicationA presentation examining the advantages and disadvantages of multi-scanning technology.
-
Video: The Value of Multi-scanning
OPSWAT
See publicationPresentation of "The Value of Multi-scanning" at the 2011 AVAR Conference in Hong Kong.
-
Network Access Control Technologies
OPSWAT
See publicationCisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Whether you call the approach network access control, network admission control, network access protection, network node validation or trusted network connect, the premise is identical – systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time…
Cisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Whether you call the approach network access control, network admission control, network access protection, network node validation or trusted network connect, the premise is identical – systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time of day. This paper will:
• Review network access control technologies de- livered by Cisco, Microsoft, Trusted Computing Group and selected non-standard-based solutions such as Nevis Networks and ConSentry Networks.
• Outline the partnerships between anti-malware companies and each one of the technologies, it will then outline the partnership process and the resources that would be required for each initiative.
• Compare the processes and list the technical, business and marketing advantages and risks of implementing each network access technology partnership.
-
How to avoid a Sony-like data breach
ITProPortal
See publicationMany businesses, whether large or small, are wondering what they need to do make sure they aren’t the next big data breach headline. Here are 10 tips to help your company avoid a massive data breach.
Patents
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content