By navigating our site, you agree to allow us to use cookies, in accordance with our Privacy Policy.

Arrow, OPSWAT Offer Critical Infrastructure Protection Suite

Arrow Electronics has decided to sign a pan-European distribution agreement with global cybersecurity company OPSWAT to offer its MetaDefender and MetaAccess cybersecurity suite of critical infrastructure protection products.

Arrow“The agreement between Arrow and OPSWAT means that customers can be safe in the knowledge that vulnerabilities – even those unknown to them, are taken care of,” said Alessandro Porro, Vice President, Global channels at OPSWAT. “There are an increasing number of weaknesses across critical infrastructure within organizations and vulnerabilities are often found where least expected. OPSWAT’s suite of cybersecurity products can handle common attack vectors so that stakeholder’s personal information and an organization’s intellectual and critical infrastructure property remains intact.”

Alexis Brabant, Vice President of Sales of Arrow’s enterprise computing solutions business in EMEA, said, “Security teams must be able to protect themselves from the threat landscape. More devices, more endpoints and more vulnerabilities than ever before – every file and device pose a security risk. The addition of OPSWAT’s cyberattack suite of products means that many more customers will have the best possible chance to help protect themselves from attack.”

The solutions offer customers malware protection and detection capabilities within an organization’s existing IT solutions and infrastructure, as well as the ability to help ensure that the network connection and the endpoint device are visible, allowed or blocked appropriately in line with threats.

Cyberattacks are becoming increasingly sophisticated and able to evade traditional signature-based and behavior-based anti-malware defenses; as a result, there is a greater need for increased security to beat zero-day attacks and malware. Also, organizations are faced with an increasing level of unknown devices accessing critical infrastructure.

Employees, customers, contractors, guests, suppliers and their devices are all potential threats to the security of infrastructure, but over-zealous protection must not inhibit business productivity.

Tags

Aishwarya Saxena

A book geek, with creative mind, an electronics degree, and zealous for writing.Creativity is the one thing in her opinion which drove her to enter into editing field. Allured towards south Indian cuisine and culture, love to discover new cultures and their customs. Relishes in discovering new music genres.

Related Articles