
Versa and OPSWAT aim to SASE device security
Versa, the global leader in Universal Secure Access Service Edge (SASE), has announced a technology partnership with OPSWAT, a global leader in critical infrastructure protection (CIP) cybersecurity solutions, to enhance the real-time device security monitoring capabilities of the Versa SASE Client.
The Versa SASE Client combines connectivity and security for users and their devices, enabling real-time best-path routing and the enforcement of dynamic security policies based on Zero Trust and continuously evaluated device security posture. As a result of this partnership, Versa has integrated OPSWAT's MetaDefender Endpoint Security SDK into the Versa SASE Client, allowing IT teams to leverage real-time device posture data to automatically validate endpoints and enforce Zero Trust policies – helping to reduce the attack surface.
'Remote workers and BYOD users need access to critical business systems and data; however, this increases organisations' threat risks if endpoint devices are not secure', said Anusha Vaidyanathan, Senior Director of Product Management at Versa. 'This partnership enables Versa customers to apply OPSWAT's MetaDefender Endpoint Security SDK directly within our VersaONE Universal SASE Platform. As businesses continue to operate in cloud and hybrid settings, this joint solution enables IT teams to minimise risk by verifying device security and compliance policies before granting access to secure company systems'.
'Our partnership with Versa validates OPSWAT's commitment to securing critical infrastructure by integrating advanced endpoint compliance capabilities directly into the VersaONE Universal SASE Platform', said Hamid Karimi, Vice President of Technical Alliances and OEM at OPSWAT. 'With OPSWAT MetaDefender Endpoint Security SDK, Versa customers can confidently ensure device compliance and security before network access, providing better defence against today's evolving cybersecurity threats'.
The MetaDefender SDK is a cross-platform, versatile, and modular framework that serves as a powerful endpoint security software development platform, enabling software engineers and technology vendors to build advanced endpoint security products. The SDK's Device Compliance Module enables software engineers to implement features in their products for a wide range of applications, including device posture assessment, as well as for potentially unwanted applications, allowing them to deliver better secure remote access, compliance, network access control, remote support, and other capabilities to their end customers.
Availability
The Versa SASE Client with OPSWAT enhancements is currently available as part of the Versa Universal SASE Platform. For more information, see https://versa-networks.com/products/versa-sase-client/.
Image Credit: OPSWAT

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Zawya
2 hours ago
- Zawya
Social media scams put users' data at risk, Kaspersky warns
Kaspersky experts warn of a wave of scams using social engineering and phishing techniques on social media and messaging apps to steal credentials and distribute malware. Taking advantage of the popularity of platforms such as WhatsApp, Facebook, Instagram, X, Telegram, and TikTok, cyber attackers are creating fake pages that mimic legitimate websites and promise everything from account verification to benefits like free followers or premium features. This situation is especially worrying considering the high level of digital exposure users face today. Over the past year, Kaspersky has identified multiple fraudulent campaigns employing sophisticated tactics and widely recognized platforms to execute their attacks. These scams operate in a variety of ways, but they all have a common goal: to obtain users' credentials or install malicious software on their devices. Below are examples of such schemes. Fake verification pages: Users were led to websites mimicking WhatsApp and other app's official interfaces. These fraudulent pages ask users for their phone number and the verification code received via SMS. With this information, cyber attackers could access accounts, take full control, and perform actions such as impersonating them, sending messages in the victim's name, or accessing confidential information. Promises of free followers: Fraudulent pages offered to boost users' digital popularity on platforms like Instagram by supposedly giving away followers. However, to access the benefit, victims had to voluntarily enter their login credentials. This strategy allows cyber attackers to take control of accounts, use them to spread further scams, or even sell them on dark markets. Example of a fraudulent website on Instagram Fake shops on TikTok: This social network has also been the target of targeted attacks, especially through its TikTok Shop feature, which allows sellers to directly associate products with posted videos, making them easier to purchase. Taking advantage of this functionality, cybercriminals created fake sites that simulate being part of TikTok Shop, with the aim of stealing sellers' credentials. Example of a fake Tik Tok page Fake security notifications: Cybercriminals sent alerts pretending to be from Facebook and similar platforms' security teams, warning of suspicious activity on the user's account. Through these notifications, they directed victims to phishing forms requesting their credentials. Once entered, the attackers could take control of personal profiles or manage pages, using them for scams, spreading malicious content, or extortion. These situations reflect the real risks associated with using social media: exposure of personal data, loss of control over accounts, dissemination of false information, and threats to privacy. Despite the increase in these types of threats, users are not defenseless. With increased awareness, good cybersecurity practices, and the use of reliable protection tools, it is possible to significantly reduce the risk of falling victim to these scams. 'Social media and communication apps have become a part of our lives, but with their popularity comes cyber risks. With the rise of artificial intelligence-based tools, scams can be more believable and personalized than ever. Therefore, it is key to maintain cybersecurity awareness, develop critical thinking, and use robust cybersecurity solutions,' comments Seifallah Jedidi, Head of Consumer Channel for META at Kaspersky. In celebration of World Social Media Day, Kaspersky experts recommend the following practices to reduce risks: Don't click on suspicious links, especially those promising unbelievable offers, benefits, or services. These often lead to phishing sites where sensitive information such as passwords or banking details is stolen. Always verify the authenticity of the sender and the content before clicking. Be careful what you share: Information like pet names, important dates, or locations can be used by cyber attackers to guess passwords or design personalized attacks. Avoid sharing travel plans, financial details, or overly personal information. Use strong passwords and two-factor authentication: Choose unique and complex passwords for each social network, combining capital letters, numbers, and symbols. Also, activate an extra security option that many platforms offer: after entering your password, you will receive a code to your phone or email to confirm it's you. This way, even if someone figures out your password, they won't be able to log in. Review your privacy settings: Platforms regularly update their policies and security options. Check who can see your content, tag you, or access your profile. Also, review and revoke permissions for third-party apps you no longer use. To make this easier, you can use Kaspersky's free Privacy Checker tool to keep track of your online information. Use cybersecurity solutions to protect your digital life: Solutions like Kaspersky Premium warn you about suspicious links and downloads, and also help you check if your phone number or e-mails appears in any data leakage, providing advice on what to do in case credentials were leaked. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them.


Tahawul Tech
3 hours ago
- Tahawul Tech
Microsoft puts ‘blue screen of death' to rest
Microsoft is ditching the notorious 'blue screen of death' feature that appears on Windows computers, 'streamlining the unexpected restart experience' with a new black-coloured screen, the company announced recently. The 'simplified' screen that appears during 'unexpected restarts' will roll out later this summer on all Windows 11 devices that use 24H2 operating software. It will also reduce reboots to 'about two seconds for most users', the company said. Variations of the 'blue screen of death' have been in use since the early 1990s. It started with the 'blue screen of unhappiness' in Windows 3.1 when the control-alt-delete shortcut was added to exit an unresponsive program, along with dialogue written by former Microsoft CEO Steve Ballmer. But according to Microsoft employee Raymond Chen, the actual 'blue screen of death' launched in 1993 on Windows NT when the 'system is unrecoverably dead at this point'. Also, a version of the black screen was introduced in 2021 to Windows 11 users. This new iteration has updated dialogue. The blue screen haunted millions of people last July when a massive outage caused by CrowdStrike brought most of the world's technology to its knees and Windows-operated machines displayed the infamous blue. Source: CNN Image Credit: Microsoft


Tahawul Tech
3 hours ago
- Tahawul Tech
Redington's next chapter: Building the future tech across Middle East and Africa region
Celebrating 25 years in the Middle East and Africa, Redington sets its sights on AI, cloud, and localised expansion to power the region's next wave of digital transformation. Standing on the stage at La Perle, Dubai, in front of a packed house of global technology vendors, strategic channel partners, and senior leadership, V.S. Hariharan, Managing Director and Group CEO, Redington, marked a defining milestone: 25 years of Redington's journey in the Middle East and Africa. The Redington ReInspire 2025 event wasn't just a celebration of the past—it was a springboard into the future. In a candid conversation on the sidelines of the event with Hariharan unpacked the company's strategic evolution from a category-focused distributor into a powerhouse delivering integrated, scalable technology solutions across the MEA region. 'When I reflect on our journey, I see four dimensions that shaped our transformation—geography, business categories, brands, and channel partners. Each played a critical role in how we built and sustained momentum,' he said. Starting with printers and later expanding into PCs, servers, mobility, cloud, and now AI, Redington's business has evolved in tandem with the needs of the market. The UAE and Saudi Arabia, once entry points, are now billion-dollar markets for the company, while Africa continues to emerge as a growth frontier. 'Redington was never just about distributing boxes. Every new category we embraced was an opportunity to create new value for our ecosystem—and to stay ahead of the curve,' Hariharan noted. At the heart of this success lies the company's symbiotic relationship with thousands of channel partners and an impressive portfolio of global technology brands. But Hariharan was quick to credit the team behind the scenes. 'A majority of our leadership and core teams have been with Redington for over two decades. That kind of continuity and trust doesn't just drive growth—it defines culture,' he said. Looking ahead, Hariharan is sharply focused on enabling the next wave of digital transformation, led by cloud, AI, and everything-as-a-service models. But rather than competing with global integrators, Redington is taking a different route. 'We're investing in competencies so we can uplift our partners. Whether they come from a hardware or cloud background, we help them scale horizontally. Our goal is to multiply—not replace—their capabilities,' he explained. This partner-led multiplier model reflects the company's ethos of democratising technology. As governments and enterprises in the region accelerate investments in AI and digital infrastructure, Redington is positioning itself as a vital enabler. With strongholds in the UAE and KSA, the company is now eyeing deeper regional penetration across the Levant, North Africa, and East Africa. Localisation, compliance, and adaptive business models are at the core of this expansion strategy. 'Africa is the opportunity of the future. But it demands a long-term view and a localised approach. We want to build not just a presence—but a purpose—in every market we enter,' said Hariharan. When asked about the UAE's growing prominence in global technology circles, Hariharan was unequivocal. 'Dubai has become one of the world's most desirable destinations for talent, investment, and innovation. We're already working on setting up an AI Centre of Excellence here to contribute meaningfully to the national AI agenda,' he revealed. As Redington charts a course toward a $10 billion regional business, its mission remains anchored in shared growth, technology democratisation, and ecosystem empowerment. 'We've always believed that our success must elevate everyone around us—our brands, our partners, and our people,' Hariharan concluded.