OPSWAT is a global cyber security company that has provided security solutions for enterprises since 2002. Trusted by over 1,000 organizations worldwide, OPSWAT prevents data breaches and malware infections by eliminating security risks from data and devices coming into an organization. MetaDefender by OPSWAT is a powerful advanced threat detection and prevention platform, offering data sanitization (CDR), vulnerability assessment, multi-scanning, heuristics, big data, and additional threat protection technologies for a solution that is not solely based on detection. MetaAccess by OPSWAT is a cloud-based access control solution that helps enforce endpoint compliance and prevents contamination of cloud applications by blocking potentially compromised or noncompliant devices from accessing SaaS applications.


  • MetaDefender: Advanced Threat Prevention
  • MetaAccess: Next Generation Access Control
  • MetaDefender Kiosk: Checkpoint for Portable Media
  • MetaDefender Client: Additional Threat Protection for the Endpoint
  • MetaDefender Vault: Secure File Transfer and Storage

Demo Desk

OPSWAT Demo Desk

With OPSWAT Specialists Dylan Higgs & Michael Hylton

Interested in learning more about OPSWAT’s results-proven solutions that prevent threats and attacks to your agency’s data and devices?

Join OPSWAT Specialists Dylan Higgs and Michael Hylton for a quick, bi-weekly demo to get all your cybersecurity questions answered. Demos topics that will be covered:

MetaDefender: a platform for preventing and detecting cybersecurity threats on multiple data channels

MetaAccess: scans and confirms that devices comply with security policies before allowing access to the cloud applications

Kiosks: a checkpoint for detecting and stopping security threats before they enter an isolated network; three models available 

New Solutions: a variety of different tools and solutions available to you by OPSWAT

If you have any questions or comments, feel free to reach out to Dylan Higgs at dylan.higgs@carahsoft.com.



SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


NERC CIP Webinar

Are you prepared for new CIP regulatory requirements?

Utilities are seeking ways to improve compliance with regulatory requirements pertaining to the Mitigation of Malicious Code for Transient Cyber Assets and Removable Media. In addition to High and Medium Impact Bulk Electric System Cyber Systems that are currently in scope, new security management controls will go into effect for Low Impact Bulk Electric System Cyber Systems on January 1, 2020. Utility personnel and vendors extensively use transient cyber assets (laptops) and removable media to accomplish daily work including preventive maintenance and system repairs.

This webinar will provide an explanation of the NERC CIP requirements as well as the implications of manual and automated mitigation strategies. An introduction to a purpose-built tool to facilitate the mitigation of malware and identification of software vulnerabilities will be covered.

Attendees will learn:

  • NERC CIP requirements for Transient Cyber Asset and Removable Media Malicious Code Mitigation
  • Examples of manual and automated malicious code mitigation strategies
  • Overview of tool to facilitate compliance with requirements and improve security posture through malware mitigation

Register Now!


Latest News

A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward….
OPSWAT®, a global provider of solutions that protect organizations from content-based threats, today announced a partnership with Carahsoft Technology Corp., The Trusted Government IT Solutions ...



Advanced threat prevention development platform.MetaDefender API allows you to integrate advanced malware protection and detection into your IT solutions and applications.

Stop Email Threats that Evade Sandboxes.

Advanced Threat Prevention for Network Traffic and Storage Devices

Secure File Transfer Solutions

Trust endpoint access to cloud applications.MetaAccess confirms that your devices comply with security policies before accessing cloud applications, like Salesforce and Microsoft 365, while delivering cross-enterprise visibility on a single pane of glass.’

Storage you can trust. Transferring files into and out of any environment exposes systems to breach and infection. Portable media are often used to conduct these transfers, bypassing security protocols. MetaDefender Vault is a secure file storage and retrieval solution that protects critical files.


Trust you can hold in your hand. Even the most isolated, air-gapped networks provide access to external devices. Any transient device, like a laptop, is a prime target for malicious attacks. MetaDefender Drive inspects devices before they enter a facility or its network—even before they boot up.

Trust at the point of entry. Anytime portable media accesses secure environments, critical infrastructure risks exposure. Software updates, reporting and audits all require external data sources. MetaDefender Kiosk acts as a digital security guard—inspecting all media for malware, vulnerabilities...

Trust at the point of entry. MetaDefender Kiosk is a digital security guard—inspecting all media for malware, vulnerabilities, and sensitive data. Three models allow you to flexibly enforce media policies, based on the specific needs of your environment.