OPSWAT Access Control Certification Program powers zero-trust architecture
OPSWAT has offered MetaAccess, zero-trust, device compliance solution- free of charge for up to 50 endpoints. MetaAccess supports MFA and secure cloud access out of the box. Try it today.
The COVID-19 pandemic has forced a lot of enterprise employees to shelter at home. IT departments were caught off-guard and scramble to limit the negative impact on productivity while enabling access to corporate resources and applications so that the staff can perform their job duties. This has given rise to the number of offsite workers who connect to their corporate assets using company-sanctioned remote access tools, whether these tools are ready for primetime or not. There is evidence that many attackers are exploiting this opportunity to use compromised devices, penetrate corporate networks and cause data theft or service disruptions. The current situation has forced a sudden paradigm shift. Many users were previously protected behind firewalls and now are using personal devices without proper vetting. A sudden surge in mobile workforce has highlighted the importance of the zero-trust model and fallacy of trusting BYOD.
Lately MetaDefender Cloud identified TrickBot, a credential-stealing malware, used a new module that launches a trojan to infect computers and initiate RDP brute-force attacks targeting the critical infrastructure. The same trojan has a track record for hijacking OpenSSH and OpenVPN credentials. A single compromised device can cause tremendous damage and destroy a company’s brand. That is why over 100 million enterprise devices rely on OPSWAT technology to offer compatibility assurance and security effectiveness. For over a dozen years, OPSWAT Access Control Certification Program has provided leading access control solution providers with the right validation tool to make certain that corporate assets are protected and devices do not pose an existential threat to organizations’ digital hygiene.
In Q1 2020, we experienced a substantial increase in vendor submissions compared to Q1 2019. A total of 40 products were submitted and 38 were awarded certifications at Platinum and Gold levels with two products that failed to qualify. The table below provides a summary of newly certified endpoint security application and disk encryption.
# | Certified Product | Vendor Name | Level | Category |
January | ||||
Platinum Anti-malware | ||||
1. | ESET Endpoint Antivirus 6.xf for Windows | ESET | Platinum | Anti-malware |
2. | Kaspersky Total Security 20.x for Windows | Kaspersky | Platinum | Anti-malware |
3. | Seqrite Endpoint Security Cloud 18.x for Windows | Quick Heal | Platinum | Anti-malware |
4. | Sophos Endpoint Security and Control 10.x for Windows | Sophos | Platinum | Anti-malware |
5. | TACHYON Endpoint Security 5.x | INCA | Platinum | Anti-malware |
Gold Anti-malware | ||||
6. | Avast Mac Security 14.x for Mac | Avast | Gold | Anti-malware |
7. | Carbon Black Defense 2.x for Linux | Carbon Black | Gold | Anti-malware |
8. | Cisco Advanced Malware Protection for Endpoints 7.2.1 for Windows | Cisco | Gold | Anti-malware |
9 | Cisco Advanced Malware Protection for Endpoints 7.2.3 for Windows | Cisco | Gold | Anti-malware |
10. | CleanMyMac X 4.x for Mac | MacPaw | Gold | Anti-malware |
11. | Cybereason ActiveProbe 19.x for Windows | Cybereason | Gold | Anti-malware |
12. | FireEye Endpoint Agent 31.x for Linux | FireEye | Gold | Anti-malware |
13. | Kaspersky Security Cloud 20.x for Windows | Kaspersky | Gold | Anti-malware |
14. | Kaspersky Security Cloud 19.x for Windows | Kaspersky | Gold | Anti-malware |
15. | Stormshield Endpoint Security 7.x for Windows | Stormshield | Gold | Anti-malware |
16. | Zillya! Internet Security 3.x for Windows | ALLIT Service | Gold | Anti-malware |
Platinum Encryption | ||||
17. | SecureDoc 8.5 | WinMagic | Platinum | Encryption |
February | ||||
Platinum Anti-malware | ||||
18. | ESET Endpoint Antivirus 7.x for Windows | ESET | Platinum | Anti-malware |
19. | ESET File Security 7.x for Windows | ESET | Platinum | Anti-malware |
20. | ESET Mail Security for Microsoft Exchange Server 7.x for Windows | ESET | Platinum | Anti-malware |
21. | Kaspersky Internet Security 21.x for Windows | Kaspersky | Platinum | Anti-malware |
22. | Kaspersky Total Security 21.x for Windows | Kaspersky | Platinum | Anti-malware |
23. | Kaspersky Anti-Virus 21.x for Windows | Kaspersky | Platinum | Anti-malware |
Gold Anti-malware | ||||
24. | Kaspersky Security Cloud 21.x for Windows | Kaspersky | Gold | Anti-malware |
25. | Malwarebytes 4.x for Mac | Malwarebytes | Gold | Anti-malware |
26. | Norton Security 22.x for Windows | Symantec | Gold | Anti-malware |
27. | Norton Security 8.x for Mac | Symantec | Gold | Anti-malware |
28. | Panda Adaptive Defense 360 8.x for Windows | Panda | Gold | Anti-malware |
29. | Panda Endpoint Protection 8.x for Windows | Panda | Gold | Anti-malware |
30. | Panda Endpoint Protection Plus 8.x for Windows | Panda | Gold | Anti-malware |
31. | SentinelOne Agent 3.7 for Windows | SentinelOne | Gold | Anti-malware |
32. | Traps 6.x for Linux | Palo alto | Gold | Anti-malware |
March | ||||
Platinum Anti-malware | ||||
33. | Quick Heal Total Security 3.x for Mac | Quick Heal | Platinum | Anti-malware |
Gold Anti-malware | ||||
34. | FireEye Endpoint Agent 32.x for Windows | FireEye | Gold | Anti-malware |
35. | FireEye Endpoint Agent 32.x for Mac | FireEye | Gold | Anti-malware |
36. | FireEye Endpoint Agent 32.x for Linux | FireEye | Gold | Anti-malware |
37. | Spybot - Search & Destroy 2.x for Windows | Safer-Networking | Gold | Anti-malware |
38. | TEHTRIS EDR 1.x for Windows | TEHTRIS | Gold | Anti-malware |
To access the complete list of over 2000 certified applications, use this link.
Find out more about our new and improved Access Control Certification Program and the certification criteria.
Security vendors may submit their applications or find out more details about the certification process by sending an email at certification@opswat.com to get started.
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 143
- Company Culture 15
- CVEs 285
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 131
- Product Announcements 349
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?