Skip to main content

Intelligence assured

Subscribe to future blog posts featured in our newsletter

Read more about how we handle personal data

Many organisations today have difficulties tracking and securing all data transfer channels that expose them to security threats. Data transfer channels, such as file uploads, portable media devices, and email attachments, all have the potential to carry targeted attacks that can damage an organisation’s reputation, financial standing, customer relationships, and for critical infrastructure, sensitive equipment and the facility itself.  

To offer a solution, OPSWAT and Advenica have partnered to bring the power of the MetaDefender platform to Advenica’s File Security Screener . The combination of Advenica's high assurance expertise and OPSWAT's advanced threat prevention techniques provides strong protection for file transfers. Protecting content in secure, isolated networks is an existential imperative, not a choice. This is particularly true when files traverse to and from secure networks.


joint solution

The MetaDefender solution for file protection

OPSWAT MetaDefender protects organisations from cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media, and endpoints. The methods used are Data sanitisation and Multi-scanning.

Data sanitisation, also known as Content Disarm and Reconstruction (CDR), is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious and sanitises and rebuilds each file ensuring full usability with safe content. The technology is highly effective for preventing known and unknown threats, including zero-day targeted attacks and threats that are equipped with malware evasion technology such as Fully Undetectable (FUD) malware, VMware detection, obfuscation and many others.

Multi-scanning is an advanced threat detection and prevention technology that increases detection rates, decreases outbreak detection times and provides resiliency to anti-malware vendor issues. 

Secure net

Secure file import with File Security Screener and MetaDefender 

File Security Screener is a high assurance unidirectional Cross Domain Solution with Data sanitisation and Multi-scanning. It provides efficient and automated counter measures for malwares and at the same time assures separation for the connected networks.

The joint solution provides:

  • Malware scanning with more than 30 anti-malware engines with zero-day threat protection
  • High assurance protection from information leaks
  • High assurance separation between different source and destination networks
  • Customisable import rules based on the source of the information and the file type
  • Scalable solution with ability to increase the number of connected source networks
  • Content inspection and Data sanitisation for in-depth protection against intrusion
  • High performance with single-pass archive extraction and file queue management

Read more about File Security Screener and the joint solution here.


The NIS directive was adopted in 2016 in EU and sets a range of network and information security requirements which apply to operators of essential services and digital service providers (DSPs). Since it is an EU directive, every EU member state has to adopt national legislation, which follows or ‘transposes’ the directive. The deadline for national transposition by the EU member states was 9 May 2018. 

NIS directive

The purpose of the NIS Directive

The directive is identical across the EU, and the laws of each country based on the directive are also very similar. The aim of the directive is to achieve a high common level of security in networks and information systems for critical societal and digital services within the Union. In this way, the internal market will be strengthened, and the vulnerabilities of central social services will be reduced.

If you want to read more about the NIS directive, whom it applies for and what needs to be done, you can do this here.

Information security

Do you know how to work systematically with information security?

According to several reports and investigations, there are still many authorities that do not work in a systematic and risk-based manner with information security, which is now actually required of them.  

We understand. Working with systematic information security work and choosing the right security measures can feel like a big and daunting task. In addition, enough resources are required to meet the requirements. The issue of information security therefore needs to be prioritised by management and decision makers.

At Advenica, we have extensive experience in analysing the security of solutions and products with the specific purpose of identifying the necessary countermeasures and measures to ensure stability. Therefore, we can help you ensure that the data and protection information you own and manage is well protected. In collaboration with you, our experts evaluate the requirements to ensure that the right level of security is defined based on identified challenges and a threat analysis.

Advenica's risk and security analysis helps to identify the problems and concretise as well as prioritise the necessary measures.

Don't wait, contact us today!