{"id":3761,"date":"2020-04-16T01:06:00","date_gmt":"2020-04-16T01:06:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3761"},"modified":"2026-02-16T21:56:57","modified_gmt":"2026-02-16T21:56:57","slug":"one-metadefender-to-rule-them-all","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all","title":{"rendered":"One MetaDefender to Rule Them All"},"content":{"rendered":"\n<p>What if there was one anti-virus tool to rule them all, one anti-virus to find them? One anti-virus to bring them all, and in the darkness\u2026? You get the idea.<\/p>\n\n\n\n<p>Unfortunately, Tolkein\u2019s Middle Earth had much fewer technological threats than what we are plagued with today, and a single anti-virus solution simply cannot find or bring, let alone bind, all of them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Out with the Old: When the Battle Axe just doesn\u2019t Cut It<\/h2>\n\n\n\n<p>Operating without some sort of malware protection is nonsensical, but just because you\u2019ve got the latest version of Windows Defender and a fancy next-gen firewall installed, that doesn\u2019t mean your organisation is fully protected.<\/p>\n\n\n\n<p>Let\u2019s take an in-depth look at the run-of-the-mill types of anti-virus available today, and why they may not be quite as effective as you think.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Traditional AV<\/h3>\n\n\n\n<p>Traditional anti-virus software works in the background of your system, taking notes on system files. It has a list of file signatures that it knows are malicious.<\/p>\n\n\n\n<p>Typically, it detects malware using four techniques:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pattern Matching<\/strong>&nbsp;\u2013 A piece of malware is represented by a string of bits known as its signature. Pattern matching is the process of anti-virus software checking through each byte in a file and matching it to a byte in its list of malware signatures. If every byte in the file matches every byte in a signature, the anti-virus software will mark the file as malicious.<\/li>\n<\/ul>\n\n\n\n<p>The downfall here is that the process relies on every single digit being the same. If just one bit does not match, the malware will evade traditional anti-virus software. Now that attackers are aware of this impediment, even miniscule mutations will bypass pattern matching processes. Newer threats such as \u201cfileless\u201d malware have no digital footprint and write nothing to the disc, therefore cannot be detected by pattern matching digital signatures at all.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Heuristic Analysis<\/strong>&nbsp;\u2013 This technique considers the properties of the file and whether these fall within what it considers \u201cabnormal\u201d. It essentially has a set of rules or questions that it asks of the file, and if every rule\/question returns true, the anti-virus flags the file as malware.<\/li>\n<\/ul>\n\n\n\n<p>This heuristic approach fails by relying too heavily on its set of rules being 100% met in order to flag software as malicious. If the attacker gains knowledge that enables their software to not meet just a single rule, the malware will not be detected.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Behavioural Analysis<\/strong>&nbsp;\u2013 This process works similarly to heuristic analysis but focuses on how the file behaves rather than its properties. If the behaviours match that of malware, the anti-virus will detect it.<\/li>\n<\/ul>\n\n\n\n<p>This process takes a rather illogical approach as it requires the program to run first, before the anti-virus can detect malware. Here\u2019s an analogy: imagine Aragorn, Legolas and Gimli monitoring the battle at Helm\u2019s Deep to spot orc weaknesses, only to discover an entirely new threat, the Uruk-hai, arriving at their doorstep. Better late than never?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hash Matching<\/strong>&nbsp;\u2013 A hash value can be generated by running a file through an algorithm, such as MD5 (Message-Digest algorithm) or SHA-256 (Secure Hashing algorithm, 256 bit). Anti-virus software calculates these hashes and compares them to hash values of malware. If the hashes match, the anti-virus will detect malware.<\/li>\n<\/ul>\n\n\n\n<p>This has drawbacks similar to pattern matching \u2013 the changing of a single bit on any part of a file used to generate the hash value will generate a completely different hash value and the anti-virus software will fail to detect malware.<\/p>\n\n\n\n<p>Furthermore, the hashing algorithms used to produce hash values have been proven unreliable. A requirement of a hash algorithm is that it is illogical to find two inputs that produce the same hash (known as collisions). MD5 is known to have such vulnerabilities, this having been&nbsp;<a href=\"https:\/\/blog.cryptographyengineering.com\/2012\/06\/05\/flame-certificates-collisions-oh-my\/\" target=\"_blank\" rel=\"noreferrer noopener\">proven in 2012 by Flame malware<\/a>, making this technique an unreliable one for anti-virus software to use. SHA-256 has also been found to produce collisions, although not to the extent of MD5.<\/p>\n\n\n\n<p>A third point of weakness is that hash matching is futile against polymorphic malware, which is malware that continually changes its features in order to remain undetected.<\/p>\n\n\n\n<p>The major fallback of traditional anti-virus is its inability to detect software that it has not encountered before. It relies on matching malware with known software in its database, making it ineffective at detecting zero-day malware (malware that has not been previously encountered). This is explained more fully in the ThreatVector article&nbsp;<a href=\"https:\/\/threatvector.cylance.com\/en_us\/home\/how-traditional-antivirus-works.html\" target=\"_blank\" rel=\"noreferrer noopener\">How Traditional Anti-virus Works<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Artificial Intelligence and Machine Learning Anti-virus<\/h3>\n\n\n\n<p>Traditional anti-virus software has been improved with Artificial Intelligence and Machine Learning anti-virus solutions.<\/p>\n\n\n\n<p>Artificial Intelligence (AI) is a program that can \u201cmimic\u201d human intelligence. Machine Learning (ML) is a subset of AI, where the machine \u201clearns\u201d as it is exposed to more data, allowing its response to improve over time.<\/p>\n\n\n\n<p>AI-based anti-malware is ideally able to recognise malicious software when it hasn\u2019t been previously identified, and\/or before it is able to execute. Machine learning programs can learn beforehand what is considered normal behaviour and are then able to identify anything that may fall outside of this, enabling pre-emptive defence against malicious software. The new threat can then be added to the anti-virus engine\u2019s existing database.<\/p>\n\n\n\n<p>AI-based anti-virus software is helpful against zero-day attacks and identifying malware that has been slightly modified in order to escape detection by traditional anti-virus software, as it relies less on known digital signatures and a set of rules, and more on how software behaves.<\/p>\n\n\n\n<p>Although advancing all the time, AI and ML anti-virus solutions are not the be-all and end-all. Here\u2019s how an AI\/ML-based system could be fooled:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Exploiting the model \u2013 ML anti-virus software is given large amounts of data and left to process and make decisions on this data based on the parameters within its model. If an attacker can find out how the model uses its parameters, they could exploit the model by changing something within a file that they know will trick the model into thinking it is safe.<\/li>\n<\/ul>\n\n\n\n<p>Take for example Cylance\u2019s AI anti-virus software, which was duped in 2019. Researchers were able to discover a bias in Cylance\u2019s ML model towards a particular game that the model had whitelisted (marked as safe). They exploited this weakness by appending non-harmful strings of code from the game to a malicious file. The researchers, from Skylight Cyber in Australia,&nbsp;<a href=\"https:\/\/threatvector.cylance.com\/en_us\/home\/how-traditional-antivirus-works.html\" target=\"_blank\" rel=\"noreferrer noopener\">trialled this technique with 384 malware programs<\/a>, with Cylance\u2019s detection rate being less than 11%.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An imperfect dataset \u2013 ML algorithms use the dataset they are provided with to learn: the more data provided for the program to learn, the more effective it will be at doing its job.<\/li>\n<\/ul>\n\n\n\n<p>However, an effective model requires all the data to be labelled correctly. If one data input is labelled incorrectly, the machine could use this particular input to form a bad decision that it then builds on as part of its learning, resulting in an ineffective model in the long term.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sandboxing<\/h3>\n\n\n\n<p>Sandboxes are used to run potentially malicious material in a tightly controlled environment with restricted network access and inability to read from input devices. A sandbox is often used to run untrusted or untested software and, because it is isolated from the host device, it can stop the spread of malware to the rest of the machine.<\/p>\n\n\n\n<p>This particular security mechanism analyses an object\u2019s behaviour as it executes, which makes it helpful in detecting malware that may have passed under the radar of other anti-virus programs while static.<\/p>\n\n\n\n<p>Although a security favourite, sandbox technology has its downfalls.<\/p>\n\n\n\n<p>One of its security measures is also a downfall. The tightly controlled sandbox environment can often be a dead giveaway for malicious software. Hackers can program malware to recognise when it\u2019s running in a sandbox environment, at which point it will terminate or, in more sophisticated programs, perform fake operations in order to appear benign, until it is marked as safe by the sandbox and delivered to the host device.<\/p>\n\n\n\n<p>Another sophisticated way through a sandbox is in delayed execution. As sandboxes are used temporarily to test and check software before allowing them onto a host device, attackers can program delays into malware so that it doesn\u2019t execute until an amount of time has passed (enough time for the sandbox to have performed its analysis) or certain operations take place, such as a restart. In the same case as above, sandboxes can fail to detect malicious behaviour and pass the malware to the host device, where it will later execute.<\/p>\n\n\n\n<p>Malicious software that is packaged within clean files often goes undetected by sandboxes, as does encrypted malware, which (unless decrypted) is simply invisible to security systems.<\/p>\n\n\n\n<p>Password-protected emails containing malware are often passed on to the end user by sandboxes as they cannot gain access to analyse it.<\/p>\n\n\n\n<p>Some programs simply cannot run in a sandbox environment due to the restrictions in place, so malware within these programs evades sandboxing systems completely.<\/p>\n\n\n\n<p>Although you wouldn\u2019t want to ride into Isengard without a sandbox at your side, make sure it\u2019s not the only thing in your arsenal \u2013 sandboxes do have several vulnerabilities that can be exploited by attackers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In with the New: From Battle Axe, to Many-Handed Longsword<\/h2>\n\n\n\n<p>Now, imagine a tool where all these solutions are covered in one. This is where Opswat MetaDefender comes in. The name speaks for itself:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>META:<\/strong>&nbsp;Most Effective Tactic Available. The best way to win the game. A specialised form. Seeing from a higher perspective. Going above and beyond.<\/li>\n\n\n\n<li><strong>Defender<\/strong>: \u2026let\u2019s assume you know this one.<\/li>\n<\/ol>\n\n\n\n<p>The MetaDefender provides a multi-layered approach, encompassing a multitude of security modules, rather than a single anti-virus engine or sandbox solution.<\/p>\n\n\n\n<p>Let\u2019s break these layers down and discover how MetaDefender triumphs over other anti-virus technologies, starting with (bring in the war-drums please\u2026) :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The MetaDefender Core<\/h3>\n\n\n\n<p>The MetaDefender Core integrates six security modules to form a comprehensive anti-virus solution that can be used on-premises, in the cloud, and with air-gapped networks.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/O_MetaDefender_Core_Shield.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Here\u2019s how it works:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Multiscanning<\/h3>\n\n\n\n<p>MetaDefender makes use of 35+ anti-malware engines when it scans files. These engines use a combination of traditional and AI\/ML tactics, such as digital signatures, heuristics, and ML models, to detect known malware files.<\/p>\n\n\n\n<p>We know why relying on a single anti-virus program to detect all threats is a mistake. MetaDefender knows this too, so has partnered with over 35 anti-malware companies which are all used to scan your files with Opswat\u2019s multiscanning module to make sure no threat slips through unnoticed.<\/p>\n\n\n\n<p>35 rings of power are better than one, right?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Deep CDR<\/h3>\n\n\n\n<p>Standing for \u2018Deep Content Disarm and Reconstruction\u2019, this security module boasts the motto \u201cTrust no file\u201d and assumes that every file is malicious. It identifies file types and scans them using its multiscanning tool.<\/p>\n\n\n\n<p>It then implements the CDR process of breaking the file down and reconstructing it, removing malicious elements and preserving the usability of the file. Voila: you now have a new, safe file to use, while the other is quarantined.<\/p>\n\n\n\n<p>Deep CDR is effective against zero-day attacks and prevents threats that may slip past other anti-virus technologies, as it disarms and rebuilds all files under the assumption that they are all evil.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Proactive DLP<\/h3>\n\n\n\n<p>MetaDefender takes protection a step further with its Proactive DLP (Proactive Data Loss Prevention) module, which redacts PII (Personally Identifiable Information) found in files being uploaded, protecting organisations from potential (and expensive) compliance violation risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">File-based Vulnerability Assessment<\/h3>\n\n\n\n<p>Vulnerability scanning is a process which detects weaknesses within a network or on a computer. Yet another step organisations must take to ensure they stay protected from hackers.<\/p>\n\n\n\n<p>Again, MetaDefender has this base covered with its file-based vulnerability assessment module.<\/p>\n\n\n\n<p>While most vulnerability scanners identify exploitable points after software has been installed, MetaDefender can get it done before installation. It can also scan for vulnerabilities while programs are running, or at rest.<\/p>\n\n\n\n<p>So far, we\u2019ve killed\u2026 four orcs with one arrow? Yes please.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Intelligence<\/h3>\n\n\n\n<p>Recall those times when you\u2019ve run a \u201cquick\u201d anti-virus scan of your device and it ended up taking three full moons, a few winters, and the dawning of a new age \u2026<\/p>\n\n\n\n<p>Anti-virus software relies on data to do its thing: matching signatures, hashing, behaviours, and a bunch of other security intel. There is so much activity going on during these traditional scans that computers can become unusable during the time it takes. If your anti-virus software had a smaller dataset, the process wouldn\u2019t be quite so tiresome, but it also wouldn\u2019t be anywhere near as effective.<\/p>\n\n\n\n<p>Incoming: cloud-based threat intelligence. Put the dataset on the cloud, and Boom! \u2013 you won\u2019t be growing a full beard in the time it takes to perform a scan.<\/p>\n\n\n\n<p>MetaDefender\u2019s threat intelligence platform has an expansive cloud-based database, developed from analysing data from thousands of computers worldwide, offering \u201cone of the fastest file hash lookup services in the market\u201d (3.86 seconds to scan a file and 15 milliseconds to look up a hash, FYI).<\/p>\n\n\n\n<p>A huge dataset and no performance issues on your device, that\u2019s another orc in the bag.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sandbox<\/h3>\n\n\n\n<p>Just to add an extra layer of chainmail, the MetaDefender Core also integrates a sandbox environment.<\/p>\n\n\n\n<p>How many orcs are we up to now? I\u2019ve lost count.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Forging the Ring: Putting it All Together in a PAM Solution<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">The Dangers of Running as Administrator<\/h3>\n\n\n\n<p>So, when do organisations run the most risk of coming face to face with the enemy, aka: malware? When they give too much power to the end user via administrator rights.<\/p>\n\n\n\n<p>Admin rights are a powerful thing and are not to be taken lightly; we all know what happens when one gets tempted by power &#8230;<\/p>\n\n\n\n<p>The majority of malware infections within an organisation result from end-users having administrator access to their computers. Aside from being able to install and execute malicious software, admin rights allow an individual to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install unauthorized software that may slow down computer systems or lead to non-work activities (stop playing solitaire Jeff! Unless it\u2019s LOTR-themed, in which case it\u2019s acceptable).<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install unlicensed software that may result in fines when software vendors come knocking.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access other user profiles and data, leading to potential privacy beaches, data breaches and theft.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Make changes to the operating system settings, which may cause a myriad of problems and be costly to fix.<\/li>\n<\/ul>\n\n\n\n<p>But, although dangerous, admin rights are a necessary evil. The answer is simply to control the evil, with PAM: Privileged Access Management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PAM to the Rescue!<\/h3>\n\n\n\n<p>PAM is the strategy of controlling user access and permissions across an organisation\u2019s IT infrastructure. The main goal is to operate in an environment of \u201cleast privilege\u201d: restricting access and permissions to the absolute minimum necessary for users to get their jobs done.<\/p>\n\n\n\n<p>We know that admin rights open the doors to the danger zone in computer systems. Administrator accounts are targets for attacks due to their privileged rights: elevated permissions, access to sensitive information, and the ability to change OS settings. In fact, according to Forrester Research, privileged credentials are involved in 80% of data breaches.<\/p>\n\n\n\n<p>With a PAM system in place, organisations can control who is accessing what, log everything being accessed\/downloaded\/installed, monitor any suspicious activity and segregate their networks. This enables businesses to crack down on the small stuff (Jeff and his solitaire addiction) and reduce their computer systems attack surface (the big stuff) without hampering productivity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">An Ode to the Fallen: Moller-Maerske<\/h3>\n\n\n\n<p>Let\u2019s talk about this \u201cbig stuff\u201d.<\/p>\n\n\n\n<p>We know that users with privileged credentials can install and run dodgy files and programs. Of greater significance is their ability to access other user profiles and data and make changes to the operating system settings because of their privileged credentials.<\/p>\n\n\n\n<p>To grasp why this is significant, one only has to ask Moller-Maerske: the world\u2019s largest container shipping company, which was brought to its knees in 2017.<\/p>\n\n\n\n<p>NotPetya ransomware is thought to have originated in a Ukrainian company\u2019s accounting software called M.E.Doc during an auto-update, and it got its foothold in just one computer in a Maerske branch in Odessa, Ukraine, when an employee requested IT admin to install the M.E.Doc software on his computer. NotPetya spread swiftly across Maerske\u2019s entire international computer system, moving laterally across the network by extracting administrator credentials. The ransomware (or \u201cwipeware\u201d, being the more appropriate term for the destructive software) took down Maerke\u2019s entire network of 4000 servers and 45,000 computers, resulting in $300,000,000 in damages to the Danish company.<\/p>\n\n\n\n<p>Read the full story here:&nbsp;<a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Untold Story of NotPetya, the Most Devastating Cyberattack in History<\/a>, and get the all the technicalities here:&nbsp;<a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cyber-security\/notpetya-timeline-of-a-ransomworm\/\" target=\"_blank\" rel=\"noreferrer noopener\">NotPetya: Timeline of a Ransomworm<\/a>.<\/p>\n\n\n\n<p>How did a company that was not the target of the attack, but was simply caught in the crossfire, allow this to happen? The previous year, Maerske IT executives had raised concerns about out-of-date operating systems, poor patching and, above all, lack of network segmentation (i.e. dividing a network into smaller parts so that one area\/set of users do not have access to others). Had Maerske implemented better network segmentation within their infrastructure, they may have been able to contain the spread of NotPetya ransomware.<\/p>\n\n\n\n<p>And how can network segmentation be achieved? Through PAM. BAM! (standing ovation please).<\/p>\n\n\n\n<p>The Ring of Power in the Right Hands: Admin By Request<\/p>\n\n\n\n<p>What do you get when you cross Opswat\u2019s MetaDefender with Admin By Request\u2019s PAM solution? Basically, a Gandalf-Aragorn hybrid that even the Witch-King of Angmar can\u2019t beat.<\/p>\n\n\n\n<p>Admin By Request has partnered with Opswat to bring you the ultimate security tool with their MetaDefender Cloud.<\/p>\n\n\n\n<p>Many solutions rely on an administrator spending endless amounts of time whitelisting programs or doing remote installs, but Admin By Request works the other way around: intercepting software installs made by users and installing it without the user being an administrator. See how it works <a href=\"\/en\/product-overview\">here<\/a>.<\/p>\n\n\n\n<p><em>No remote installs necessary and no need to be constantly updating whitelists leads to a very grateful IT department.<\/em><\/p>\n\n\n\n<p><em>Mitigated vulnerabilities from not having admin accounts left, right and centre leads to a very safe computer network.<\/em><\/p>\n\n\n\n<p>Combine this PAM solution with MetaDefender\u2019s 35+ anti-virus engines, and the chances of your system being compromised are virtually zero.<\/p>\n\n\n\n<p>Fun fact: Bitdefender and Avira anti-virus solutions are often 100% effective against malware. Both of these engines are part of the 35+ that supply the MetaDefender Core.<\/p>\n\n\n\n<p>Opswat&#8217;s\u00a0<a href=\"https:\/\/www.opswat.com\/docs\/mdcloud\/knowledge-base\/why-metadefender-cloud-and-not-other-vendors-\" target=\"_blank\" rel=\"noopener\" title=\"\">Detection\u00a0Efficacy overview<\/a>\u00a0provides more of an insight into just how well the Multiscanning module does its\u00a0job: 4 engines detect 62.80% of the top 10,000 searched for\u00a0threats from the MetaDefender Cloud database,\u00a012\u00a0engines detect 90.53%,\u00a020 engines detect 98.69%, and the MetaDefender Cloud detects 99.4%.<\/p>\n\n\n\n<p>To put it simply: Jeff may not have a valid reason for installing LOTR-themed solitaire onto his work computer, but at least you can rest assured knowing it\u2019s safe.<\/p>\n\n\n\n<p>See how Opswat is implemented by Admin By Request:&nbsp;<a href=\"\/en\/docs\/malware-detection\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request \u2013 Malware Detection<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Epilogue<\/h2>\n\n\n\n<p>In Opswat\u2019s words:<\/p>\n\n\n\n<p><em>\u201cSingle anti-malware engines, next-gen firewalls, sandboxes, machine learning, IPSs, and proxy anti-malware solutions do not provide adequate cybersecurity protection on their own\u201d<\/em>.<\/p>\n\n\n\n<p>Can one anti-malware solution really rule them all?<\/p>\n\n\n\n<p>Absolutely, if it combines an array of anti-malware tactics and an ingenuitive PAM solution into one war-effort. Download it <a href=\"\/en\/freeplandownload\">here<\/a>.<\/p>\n\n\n\n<p>Take that Sauron.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about OPSWAT&#8217;s MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.<\/p>\n","protected":false},"author":2,"featured_media":7857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,131,186,113,189,187,94,82,185,184,188,84],"ppma_author":[10],"class_list":["post-3761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-antivirus","tag-antivirus-engine","tag-api","tag-cloud-computing","tag-detection","tag-integration","tag-malware","tag-metadefender","tag-opswat","tag-tactic","tag-virus","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Learn about OPSWAT&#039;s MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,antivirus,antivirus engine,api,cloud computing,detection,integration,malware,metadefender,opswat,tactic,virus\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"One MetaDefender to Rule Them All \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Learn about OPSWAT&#039;s MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-04-16T01:06:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-02-16T21:56:57+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"One MetaDefender to Rule Them All \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Learn about OPSWAT&#039;s MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#blogposting\",\"name\":\"One MetaDefender to Rule Them All \\u00bb Admin By Request\",\"headline\":\"One MetaDefender to Rule Them All\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1-16-07.png\",\"width\":1500,\"height\":784,\"caption\":\"Protect your data with confidence. Image of two peoples' arms typing on keyboards, overlaid with digital art of padlock symbols.\"},\"datePublished\":\"2020-04-16T01:06:00+00:00\",\"dateModified\":\"2026-02-16T21:56:57+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#webpage\"},\"articleSection\":\"Blogs, Antimalware, Antivirus, Antivirus Engine, API, Cloud Computing, Detection, Integration, Malware, MetaDefender, OPSWAT, Tactic, Virus, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#listItem\",\"name\":\"One MetaDefender to Rule Them All\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#listItem\",\"position\":3,\"name\":\"One MetaDefender to Rule Them All\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all\",\"name\":\"One MetaDefender to Rule Them All \\u00bb Admin By Request\",\"description\":\"Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1-16-07.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all\\\/#mainImage\",\"width\":1500,\"height\":784,\"caption\":\"Protect your data with confidence. Image of two peoples' arms typing on keyboards, overlaid with digital art of padlock symbols.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/one-metadefender-to-rule-them-all#mainImage\"},\"datePublished\":\"2020-04-16T01:06:00+00:00\",\"dateModified\":\"2026-02-16T21:56:57+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>One MetaDefender to Rule Them All \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"One MetaDefender to Rule Them All \u00bb Admin By Request","description":"Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,antivirus,antivirus engine,api,cloud computing,detection,integration,malware,metadefender,opswat,tactic,virus","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#blogposting","name":"One MetaDefender to Rule Them All \u00bb Admin By Request","headline":"One MetaDefender to Rule Them All","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/04\/1-16-07.png","width":1500,"height":784,"caption":"Protect your data with confidence. Image of two peoples' arms typing on keyboards, overlaid with digital art of padlock symbols."},"datePublished":"2020-04-16T01:06:00+00:00","dateModified":"2026-02-16T21:56:57+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#webpage"},"articleSection":"Blogs, Antimalware, Antivirus, Antivirus Engine, API, Cloud Computing, Detection, Integration, Malware, MetaDefender, OPSWAT, Tactic, Virus, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#listItem","name":"One MetaDefender to Rule Them All"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#listItem","position":3,"name":"One MetaDefender to Rule Them All","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all","name":"One MetaDefender to Rule Them All \u00bb Admin By Request","description":"Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/04\/1-16-07.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all\/#mainImage","width":1500,"height":784,"caption":"Protect your data with confidence. Image of two peoples' arms typing on keyboards, overlaid with digital art of padlock symbols."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all#mainImage"},"datePublished":"2020-04-16T01:06:00+00:00","dateModified":"2026-02-16T21:56:57+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"One MetaDefender to Rule Them All \u00bb Admin By Request","og:description":"Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-04-16T01:06:00+00:00","article:modified_time":"2026-02-16T21:56:57+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"One MetaDefender to Rule Them All \u00bb Admin By Request","twitter:description":"Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3761","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-02-16 22:12:12","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2023-05-22 21:55:15","updated":"2026-02-16 22:12:12"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tOne MetaDefender to Rule Them All\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"One MetaDefender to Rule Them All","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/one-metadefender-to-rule-them-all"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3761"}],"version-history":[{"count":3,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3761\/revisions"}],"predecessor-version":[{"id":31244,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3761\/revisions\/31244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7857"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3761"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}