A atualização que não pode deixar de fazer: fim do suporte para o Office 2016 e o Office 2019

Ler agora
Utilizamos inteligência artificial para as traduções dos sítios e, embora nos esforcemos por garantir a exatidão, estas podem nem sempre ser 100% precisas. Agradecemos a sua compreensão.

File-Based Vulnerability
Assessment

Identify Vulnerabilities Before Software Is Installed

Detect known software vulnerabilities by directly analyzing files before applications, or libraries ever execute.
File-Based Vulnerability Assessment proactively identifies vulnerable software components at the file level,
closing security gaps left by traditional post-installation scanners.

  • Pre-Installation Detection
  • Binary-Level Insight
  • Superfície de ataque reduzida

OPSWAT tem a confiança de

0
Clientes em todo o mundo
0
Parceiros tecnológicos
0
Endpoint Cert. Membros

Patented
Technology
U.S. 9749349 B1

2.5k

Fornecedores suportados 

30k+

Associated CVEs With
Severity Information

3M

Identified Active
Vulnerable Hashes

Analyze

Executables and
Installers

Identify Risks Without System Footprint Reliance

Scan Rest-State and Running Applications

Traditional Vulnerability Scanning
Leaves Critical Gaps

Post-installation scanning and footprint-based detection miss vulnerabilities in software before deployment,
leaving systems exposed to potential threats.

Vulnerabilities Are Detected Too Late

Most scanners identify vulnerabilities only after software is installed and running, creating a window where attackers can exploit known weaknesses.

Incomplete Visibility Into Software Components

Traditional tools rely on system footprints, registry entries, or package managers that can be missing, altered, or intentionally hidden.

High Risk in Isolated and OT Environments

Air-gapped, OT, and critical infrastructure environments cannot afford vulnerable software entering networks undetected through removable media or updates.

  • Late Detection

    Vulnerabilities Are Detected Too Late

    Most scanners identify vulnerabilities only after software is installed and running, creating a window where attackers can exploit known weaknesses.

  • Incomplete Visibility

    Incomplete Visibility Into Software Components

    Traditional tools rely on system footprints, registry entries, or package managers that can be missing, altered, or intentionally hidden.

  • High Risk

    High Risk in Isolated and OT Environments

    Air-gapped, OT, and critical infrastructure environments cannot afford vulnerable software entering networks undetected through removable media or updates.

Proactive Vulnerability Detection at the File Level

File-Based Vulnerability Assessment identifies vulnerable software by directly analyzing files before installation, execution, or network access.

Pre-Installation
Vulnerability Detection

Scan files before deployment to identify known vulnerabilities and prevent risky software from entering environments in the first place.

Binary-Level Software
Intelligence

Analyze executables, installers, and libraries directly—without relying on installed software footprints or system state.

Protection for High-
Security Environments

Secure air-gapped, OT, and critical systems by assessing files before they reach isolated networks.

How File-Based Vulnerability Assessment Works

OPSWAT analyzes files directly and correlates them with known vulnerabilities using advanced software intelligence.

PASSO 1

Análise de ficheiros

PASSO 1

Análise de ficheiros

Executable files, installers, and libraries are analyzed to identify software components and version information.

PASSO 2

Vulnerability Correlation

PASSO 2

Vulnerability Correlation

Identified components are mapped to known CVEs using OPSWAT’s continuously updated vulnerability intelligence.
PASSO 3

Risk-Based Decisions

PASSO 3

Risk-Based Decisions

Security policies can block, allow, or remediate files based on vulnerability severity and organizational risk tolerance.

  • PASSO 1

    Análise de ficheiros

    Executable files, installers, and libraries are analyzed to identify software components and version information.

  • PASSO 2

    Vulnerability Correlation

    Identified components are mapped to known CVEs using OPSWAT’s continuously updated vulnerability intelligence.
  • PASSO 3

    Risk-Based Decisions

    Security policies can block, allow, or remediate files based on vulnerability severity and organizational risk tolerance.

Características principais

Pre-Execution Vulnerability
Detection

Stops vulnerable software before it executes,
significantly reducing exposure and
eliminating blind spots left by post-
installation scanning.

Footprint-Independent Analysis

Detect vulnerabilities without relying on
registry entries, package managers, or
installed software artifacts.

Broad File Format Coverage

Supports a wide range of binaries, including
applications, installers, and shared libraries.

Implementar em qualquer lugar, integrar em qualquer lugar

Solução escalável e abrangente de segurança de ficheiros que se integra sem problemas e segue os seus ficheiros para onde quer que vão.

Cloud

Scalable vulnerability assessment delivered through OPSWAT cloud services.

On-Prem

Ideal for regulated, air-gapped, or high-security environments.

Híbrido

Flexible deployment combining cloud and on-premises controls.

OPSWAT trabalha onde você trabalha

Evite ameaças e ataques de dia zero com soluções fáceis de implantar, integrar e manter que se encaixam na sua pilha de tecnologia existente. Integre via REST API ou conectores nativos para suportar uma variedade de cenários de implantação. Oferecemos soluções para aplicativos nativos da nuvem, em contêineres e hospedados localmente.

Stop Vulnerable Software Before It’s Installed

Preencha o formulário e entraremos em contacto no prazo de 1 dia útil.
Confiado por mais de 2.000 empresas em todo o mundo.