OPSWAT
| Error creating thumbnail: File missing | |
| Company type | Private |
|---|---|
| Industry | Cybersecurity |
| Founded | 2002 |
| Founder | Benny Czarny |
Key people | Benny Czarny (CEO, founder) |
| Products | MetaDefender, MetaAccess, Cross‑Domain solutions, etc. |
| Services | File security, malware prevention, network access control, zero-day protection |
| Website | opswat.com |
OPSWAT, Inc. is an American cybersecurity company that develops software and hardware for critical infrastructure protection (CIP) across information technology (IT), operational technology (OT), and industrial control systems (ICS).[1] Its products are used for threat detection, endpoint security, and cloud and network protection.[2]
The company was founded in 2002 by Benny Czarny in San Francisco, California. As of 2025, it has offices and critical infrastructure protection laboratories in Dubai (UAE),[3] Ho Chi Minh City (Vietnam),[4] London (UK),[5] Petah Tikva (Israel),[6] Tampa[7][8] and Washington, D.C. (USA),[9] Timișoara (Romania),[10] Tokyo (Japan), and Veszprém (Hungary).[11]
OPSWAT's technologies have been integrated into security products from firms such as Cisco, Microsoft, Symantec, and F5 Networks.[12] The company also publishes research and reports on cybersecurity threats and vulnerabilities.[13]
History
[edit | edit source]OPSWAT was founded in 2002 by Benny Czarny in San Francisco.[12][6] Initially, the company developed cybersecurity tools for file and device protection. In 2004, it released the OESIS Framework SDK, a software development kit for detecting security software and automating patch management.[12] A certification program for antivirus and endpoint security was launched in 2007.[14]
The company expanded through acquisitions, beginning with MetaDefender in 2009 and including companies such as Impulse (2019),[7][8] Bayshore Networks (2021),[15] SNDBOX (2021),[16] and FileScan.IO (2022).[17] More recent acquisitions include InQuest (2024)[18][19] and Fend Incorporated (2025),[18][20] which expanded its operations in network detection, malware analysis, and OT security.

In 2021, OPSWAT raised $125 million in Series A funding from Brighton Park Capital.[21][22] The company moved its headquarters to Tampa, Florida,[7][8] in 2022.
In 2023, OPSWAT opened an office in Hanoi, Vietnam,[23] and in 2025, it established a new location in Arlington County, Virginia.[6]
As of 2023, OPSWAT had around 400 employees and 10 offices.[22][21] It also operates out of other offices in Australia and New Zealand,[1][6] India,[24] Saudi Arabia,[3] Singapore.[25]
Technologies and products
[edit | edit source]OPSWAT develops cybersecurity software used for system assessment, threat detection, and compliance enforcement.[12] Its SDK supports detection of antivirus, antispyware, VPN, anti-spam, and anti-phishing software and enforces patch management.[12][26]
Its software is licensed by companies including Cisco, F5 Networks, Symantec, Juniper Networks, and Microsoft.[12] OPSWAT technology has been integrated into products such as Clean Access NAC (Cisco), FirePass SSL VPN (F5 Networks), SSL VPN (Juniper Networks), and Whole Security Confident Online (Symantec).[12]
Key products include MetaDefender, a platform for threat detection through multiscanning, content disarm and reconstruction (CDR), file vulnerability assessment, and data loss prevention (DLP),[21] and MetaAccess, a tool for endpoint compliance and cloud access control that manages access based on device status and security posture.[21]
Acquisitions
[edit | edit source]| # | Date | Company | Business | Country | Value (USD) | Ref(s). |
|---|---|---|---|---|---|---|
| 1 | July 20, 2009 | MetaDefender | Antivirus scanning engine toolkit | File:Flag of the United States (23px).png United States | — | |
| 2 | February 15, 2012 | Napera Networks | Cloud-based network monitoring | File:Flag of the United States (23px).png United States | — | |
| 3 | January 20, 2015 | Red Earth Software | Email security and file transfer | File:Flag of the United States (23px).png United States | — | |
| 4 | December 1, 2019 | Impulse | Network access control | File:Flag of the United States (23px).png United States | — | [8] |
| 5 | July 19, 2021 | Bayshore Networks | OT and ICS cybersecurity | File:Flag of the United States (23px).png United States | — | [15] |
| 6 | September 10, 2021 | SNDBOX | Malware analysis sandbox | File:Flag of Israel.svg Israel | — | [16] |
| 7 | April 1, 2022 | CIP Cyber | Critical infrastructure protection services | File:Flag of the United States (23px).png United States | — | [18] |
| 8 | October 27, 2022 | FileScan.IO | Malware analysis | File:Flag of the United States (23px).png United States | — | [27] |
| 9 | August 7, 2024 | InQuest | Network detection and threat intelligence | File:Flag of the United States (23px).png United States | — | [18] |
| 10 | December 18, 2024 | Fend Incorporated | Data diode and OT gateway solutions | File:Flag of the United States (23px).png United States | — | [18] |
Research
[edit | edit source]OPSWAT conducts research on malware, operational technology security, vulnerability assessment, air-gapped networks, and industrial control systems.[13] It publishes analytical reports and market analyses related to antivirus, antispyware, and encryption technologies.[13]
In 2025, OPSWAT released the Threat Landscape Report, analyzing file executions in sandbox environments to study malware behavior and detection rates.[28] The report noted an increase in malware complexity and indicated that one in fourteen threats were not detected by traditional security tools.[28]
In April 2025, OPSWAT specialists reported three vulnerabilities in the Rack::Static component for Ruby (CVE-2025-27610, CVE-2025-27111, CVE-2025-25184) that could have allowed attackers to access files and modify server logs.[29]
Also in 2025, OPSWAT and the Ponemon Institute published a report on file security, which identified insider data leaks as a commonly reported security concern.[30] According to the study, 27% of organizations use data loss prevention (DLP) technologies to combat insider threats.[30]
References
[edit | edit source]- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c d Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c d Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c d e f g Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c d e Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b c d Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).[dead link]
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).
- ^ a b Lua error in Module:Citation/CS1/Configuration at line 2172: attempt to index field '?' (a nil value).