.Benny .Czarny

.Benny .Czarny

Tampa, Florida, United States
38K followers 500+ connections

About

I started OPSWAT because I saw a dangerous gap in how the world protects critical…

Articles by .Benny

Activity

38K followers

See all activities

Experience

Education

  • Technion-Machon Technologi Le' Israel

    -

    -

Licenses & Certifications

Publications

  • Five Steps to Securing Data Workflows in Your Organization

    OPSWAT

    how can you implement a secure data workflow in your organization? This post shows the five steps involved in the secure data flow planning process.

    See publication
  • 4 Things to Consider When Assessing Device Posture for Effective Network Access Control

    Malwarebytes

    Having a NAC solution in place is important if you want to keep your network and private data secure. However, remember to take a look beyond just whether a user has the required security applications installed. Take the extra step to perform a quality check – not all security applications are created equal.

    See publication
  • Secure Data Workflow

    OPSWAT

    An overview of common data security challenges facing businesses, with suggestions for organizations looking to secure the flow of data within their network, but not sure where to start. Topics include best practices for detecting and preventing threats. Presented at ITpro EXPO 2014 in Tokyo, Japan.

    See publication
  • Introduction to Malware

    OPSWAT

    A discussion of the history and theory of malware, plus the challenges in detecting it. Presented at San Francisco State University.

    See publication
  • The Value of Multi-scanning

    OPSWAT

    A presentation examining the advantages and disadvantages of multi-scanning technology.

    See publication
  • Video: The Value of Multi-scanning

    OPSWAT

    Presentation of "The Value of Multi-scanning" at the 2011 AVAR Conference in Hong Kong.

    See publication
  • Network Access Control Technologies

    OPSWAT

    Cisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Whether you call the approach network access control, network admission control, network access protection, network node validation or trusted network connect, the premise is identical – systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time…

    Cisco, Microsoft and the Trusted Computing Group are battling to control the keys to locking untrusted endpoints out of networks. Whether you call the approach network access control, network admission control, network access protection, network node validation or trusted network connect, the premise is identical – systems should grant access to the network based on factors such as anti-malware protection level, personal firewall assessment, host and user authentication, location, and even time of day. This paper will:

    • Review network access control technologies de- livered by Cisco, Microsoft, Trusted Computing Group and selected non-standard-based solutions such as Nevis Networks and ConSentry Networks.

    • Outline the partnerships between anti-malware companies and each one of the technologies, it will then outline the partnership process and the resources that would be required for each initiative.

    • Compare the processes and list the technical, business and marketing advantages and risks of implementing each network access technology partnership.

    See publication
  • How to avoid a Sony-like data breach

    ITProPortal

    Many businesses, whether large or small, are wondering what they need to do make sure they aren’t the next big data breach headline. Here are 10 tips to help your company avoid a massive data breach.

    See publication

Patents

  • Network Access Control with Compliance Policy Check

    Issued US 9,288,199

    Other inventors
  • Determining Whether a Data Storage is Encrypted

    Issued US 9,021,163 B1


    Other inventors

View .Benny’s full profile

  • See who you know in common
  • Get introduced
  • Contact .Benny directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses