Introduction to OESIS® Framework
April
2013
Applications Manageability – OESIS Framework
The Mission
OESIS Framework
 Enables software engineers and technology vendors to develop
products that can detect, classify, and manage thousands of third-
party software applications
 Enables implementing a simple and easy compliance check of
endpoints via embedded libraries
 Supported platforms include:
 Windows
 Mac OS X
 Linux
 Android
 iOS
OESIS Framework
 Support nearly any 3rd application in the market for:
Antivirus
Antispyware
Personal Firewall
Antiphishing
Backup
Patch Management
Hard Disk Encryption
Health Agents
URL Filtering
Data Loss Prevention
Public File Sharing
Web Browsers
Desktop Sharing
VPN Clients
Virtual Machines
Device Access
Control
Mobile Applications
o Android
o iOS
 OESIS APIs for above application-types: here
AntivirusAPIs
Detection APIs
 Retrieve the name and version of the antivirus product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing that can occur when
using only WMI
Assessment APIs
 Retrieve the count of malware signatures
 Retrieve the time of the last definition update
 Retrieve the real time protection status
 Retrieve the last full system scan time
 Retrieve the history of threat detections and actions performed to assess
the risk level of an endpoint (includes information such as threat name and
severity)
Remediation APIs
 Launch a full system scan
 Enable real time protection
 Activate an update of the virus definitions
View Supported Apps: click here
Web Browser APIs
Detection APIs
 Retrieve the name and version of the web browser
 Retrieve a list of installed browser extensions
 Check whether the browser is the default browser
 Determine which browsers are currently open on the machine
 Determine which sites are currently open in the browser
Assessment APIs
 Retrieve the browsing history
 Determine whether the browser's popup blocker is enabled
Remediation APIs
 Open a specific URL in the browser
 Close the browser
 Securely delete browsing history
View Supported Apps: click here
Hard Disk EncryptionAPIs
Detection APIs
 Retrieve the name and version of the hard disk encryption product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Check the encryption state
 Get a list of supported encryption algorithms
 Retrieve encrypted locations
Remediation APIs
 Enable Encryption
View Supported Apps: click here
Virtual Machine APIs
Detection APIs
 Retrieve the name and version of the virtual machine product
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the virtual machine is running
 Retrieve a list of all VMs
 Retrieve details for each VM on the system including OS and version
Remediation APIs
 Stop a virtual machine
 Pause a virtual machine
View Supported Apps: click here
Public File SharingAPIs
Detection APIs
 Retrieve the name and version of the public file sharing application
 Verify product authenticity: Ensure that the installed product has been
signed by the vendor to protect against spoofing
Assessment APIs
 Determine if the application is running
Remediation APIs
 Terminate the running application
View Supported Apps: click here
OESIS Developer Testing Harness
OESIS Capability Charts
By Product, by OS, by Version
Mobile Capabilities
Product Categories
iOS additional category support in 2013!
Compliance
• Antivirus
• Firewall
• Backup
Management
• MDM
• MAM
Compromising
• Monitoring
Tools
• Location
Services
• Geo
Location
Android:
 Detection
 Name
 Vendor
 Version
 Is Authentic?
 Is Running?
 Remediation
 Launch Application
MobileAPIs
iOS:
 Detection
 Name
 Vendor
 Is Running?
Android and iOS
Mobile Testing Harness
OESIS User Stories
SSL VPN
 When granting remote network access, system administrators need
the ability to assess an endpoint to ensure that it will not
compromise the security of the network. Many SSL VPN solutions
provide this ability to administrators by utilizing OESIS Framework
to help power endpoint compliance checking.
OESIS User Stories
 Dell SonicWall
OESIS User Stories
 Citrix
OESIS User stories
NAC (Network Access Control)
 NAC solutions utilize OESIS to enable the creation and checking
of access policies. The solutions use OESIS to pull data from
endpoints that can be used to determine whether users may
connect. For example, the policy might require that a device
connecting to the corporate network has all the latest antivirus
definitions installed.
OESIS User stories
 Cisco
OESIS User stories
 Juniper Networks
User stories
Support Tools
 Vendors who provide remote technology services to consumers and
businesses to fix issues or configure endpoints utilize OESIS to build in
some of their standard checks.
User stories
 F-Secure
User stories
 Support.com
User stories
Many more:
 Managed Services
 Vendors of cloud based IT Management solutions, utilize OESIS to power
features of their cloud based applications.
 Compliance solutions and vulnerability assessment
 OESIS Framework provides extensive management capabilities that enable
applications in this market segment to meet compliance requirements or to
make sure that endpoints respond to security compliance mandates.
User stories
 iPass
User stories
 LogMeIn
OPSWAT Security Score
Free demo of OESIS Framework
http://www.opswat.com/products/security-score

More Related Content

PDF
Red forest Design ESAE
PPTX
Sistema de Juego 1-4-2-3-1
PDF
La periodización táctica Pablo Puente Incera
PDF
El Modelo de juego del F.C. Barcelona
PPTX
Preventing Known and Unknown Threats
DOC
Biographical information for mmf2011 int'lrev
PPT
Kettingenwebshop
PPTX
Seguridad
Red forest Design ESAE
Sistema de Juego 1-4-2-3-1
La periodización táctica Pablo Puente Incera
El Modelo de juego del F.C. Barcelona
Preventing Known and Unknown Threats
Biographical information for mmf2011 int'lrev
Kettingenwebshop
Seguridad

Similar to Introduction to OESIS Framework (20)

PPTX
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
PDF
Unity Makes Strength
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
4aa5 3404
PDF
Cyber defense for soa & rest oracle
PDF
Layer 7 & Oracle: Cyber Defense for SOA & REST
PDF
Presentation cyber defense for soa & rest
PPTX
OpenIDM - An Introduction
PPTX
Contemporary software TRENDS SOFTWARE TRENDS
PDF
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
PDF
Strategies for Web Application Security
PDF
Strategies for Web Application Security
PDF
Unity Makes Strength SOURCE Dublin 2013
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PDF
Open Cloud Interop Public
PPTX
Blue Teaming on a Budget of Zero
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
PPTX
Ending the Tyranny of Expensive Security Tools
PPTX
Ending the Tyranny of Expensive Security Tools
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
Unity Makes Strength
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
4aa5 3404
Cyber defense for soa & rest oracle
Layer 7 & Oracle: Cyber Defense for SOA & REST
Presentation cyber defense for soa & rest
OpenIDM - An Introduction
Contemporary software TRENDS SOFTWARE TRENDS
NTXISSACSC3 - Manage Mobile Security Incidents like A Boss by Ismail Guneydas
Strategies for Web Application Security
Strategies for Web Application Security
Unity Makes Strength SOURCE Dublin 2013
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Open Cloud Interop Public
Blue Teaming on a Budget of Zero
Geek Night 15.0 - Touring the Dark-Side of the Internet
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
Ad

More from OPSWAT (16)

PDF
How to Identify Potentially Unwanted Applications
PDF
Securing Nuclear Facilities
PDF
3 Cases for Quarantine Confirgurations
PDF
Protecting the Oil and Gas Industry from Email Threats
PDF
Reasons for the Popularity of Medical Record Theft
PDF
Defense Innovation Summit
PDF
Top 10 Facts About Data Breaches
PPTX
Metascan Multi-Scanning Technology for Linux
PPTX
Secure Data Workflow
PPTX
Network Security for Employees
PPTX
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Securing data flow to and from organizations
PPTX
Introduction to Metascan Client
PPTX
Metascan Multi-scanning Technology
PPTX
The Value of Multi-scanning
How to Identify Potentially Unwanted Applications
Securing Nuclear Facilities
3 Cases for Quarantine Confirgurations
Protecting the Oil and Gas Industry from Email Threats
Reasons for the Popularity of Medical Record Theft
Defense Innovation Summit
Top 10 Facts About Data Breaches
Metascan Multi-Scanning Technology for Linux
Secure Data Workflow
Network Security for Employees
Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure
Malware and Anti-Malware Seminar by Benny Czarny
Securing data flow to and from organizations
Introduction to Metascan Client
Metascan Multi-scanning Technology
The Value of Multi-scanning
Ad

Recently uploaded (20)

PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
What is a Computer? Input Devices /output devices
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Architecture types and enterprise applications.pdf
PPTX
Modernising the Digital Integration Hub
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
The various Industrial Revolutions .pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
2018-HIPAA-Renewal-Training for executives
sbt 2.0: go big (Scala Days 2025 edition)
Taming the Chaos: How to Turn Unstructured Data into Decisions
What is a Computer? Input Devices /output devices
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august
Abstractive summarization using multilingual text-to-text transfer transforme...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Architecture types and enterprise applications.pdf
Modernising the Digital Integration Hub
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
UiPath Agentic Automation session 1: RPA to Agents
The various Industrial Revolutions .pptx
Developing a website for English-speaking practice to English as a foreign la...
A proposed approach for plagiarism detection in Myanmar Unicode text
Chapter 5: Probability Theory and Statistics
2018-HIPAA-Renewal-Training for executives

Introduction to OESIS Framework

  • 1. Introduction to OESIS® Framework April 2013
  • 2. Applications Manageability – OESIS Framework The Mission
  • 3. OESIS Framework  Enables software engineers and technology vendors to develop products that can detect, classify, and manage thousands of third- party software applications  Enables implementing a simple and easy compliance check of endpoints via embedded libraries  Supported platforms include:  Windows  Mac OS X  Linux  Android  iOS
  • 4. OESIS Framework  Support nearly any 3rd application in the market for: Antivirus Antispyware Personal Firewall Antiphishing Backup Patch Management Hard Disk Encryption Health Agents URL Filtering Data Loss Prevention Public File Sharing Web Browsers Desktop Sharing VPN Clients Virtual Machines Device Access Control Mobile Applications o Android o iOS  OESIS APIs for above application-types: here
  • 5. AntivirusAPIs Detection APIs  Retrieve the name and version of the antivirus product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing that can occur when using only WMI Assessment APIs  Retrieve the count of malware signatures  Retrieve the time of the last definition update  Retrieve the real time protection status  Retrieve the last full system scan time  Retrieve the history of threat detections and actions performed to assess the risk level of an endpoint (includes information such as threat name and severity) Remediation APIs  Launch a full system scan  Enable real time protection  Activate an update of the virus definitions View Supported Apps: click here
  • 6. Web Browser APIs Detection APIs  Retrieve the name and version of the web browser  Retrieve a list of installed browser extensions  Check whether the browser is the default browser  Determine which browsers are currently open on the machine  Determine which sites are currently open in the browser Assessment APIs  Retrieve the browsing history  Determine whether the browser's popup blocker is enabled Remediation APIs  Open a specific URL in the browser  Close the browser  Securely delete browsing history View Supported Apps: click here
  • 7. Hard Disk EncryptionAPIs Detection APIs  Retrieve the name and version of the hard disk encryption product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Check the encryption state  Get a list of supported encryption algorithms  Retrieve encrypted locations Remediation APIs  Enable Encryption View Supported Apps: click here
  • 8. Virtual Machine APIs Detection APIs  Retrieve the name and version of the virtual machine product  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the virtual machine is running  Retrieve a list of all VMs  Retrieve details for each VM on the system including OS and version Remediation APIs  Stop a virtual machine  Pause a virtual machine View Supported Apps: click here
  • 9. Public File SharingAPIs Detection APIs  Retrieve the name and version of the public file sharing application  Verify product authenticity: Ensure that the installed product has been signed by the vendor to protect against spoofing Assessment APIs  Determine if the application is running Remediation APIs  Terminate the running application View Supported Apps: click here
  • 11. OESIS Capability Charts By Product, by OS, by Version
  • 12. Mobile Capabilities Product Categories iOS additional category support in 2013! Compliance • Antivirus • Firewall • Backup Management • MDM • MAM Compromising • Monitoring Tools • Location Services • Geo Location
  • 13. Android:  Detection  Name  Vendor  Version  Is Authentic?  Is Running?  Remediation  Launch Application MobileAPIs iOS:  Detection  Name  Vendor  Is Running? Android and iOS
  • 15. OESIS User Stories SSL VPN  When granting remote network access, system administrators need the ability to assess an endpoint to ensure that it will not compromise the security of the network. Many SSL VPN solutions provide this ability to administrators by utilizing OESIS Framework to help power endpoint compliance checking.
  • 16. OESIS User Stories  Dell SonicWall
  • 18. OESIS User stories NAC (Network Access Control)  NAC solutions utilize OESIS to enable the creation and checking of access policies. The solutions use OESIS to pull data from endpoints that can be used to determine whether users may connect. For example, the policy might require that a device connecting to the corporate network has all the latest antivirus definitions installed.
  • 20. OESIS User stories  Juniper Networks
  • 21. User stories Support Tools  Vendors who provide remote technology services to consumers and businesses to fix issues or configure endpoints utilize OESIS to build in some of their standard checks.
  • 24. User stories Many more:  Managed Services  Vendors of cloud based IT Management solutions, utilize OESIS to power features of their cloud based applications.  Compliance solutions and vulnerability assessment  OESIS Framework provides extensive management capabilities that enable applications in this market segment to meet compliance requirements or to make sure that endpoints respond to security compliance mandates.
  • 27. OPSWAT Security Score Free demo of OESIS Framework http://www.opswat.com/products/security-score

Editor's Notes