MetaDefender Drive Smart Touch v1.1.0

Released on Sep 08, 2025This is the initial release of MetaDefender Drive with Smart Touch. The newest from factor built for remote and isolated environments where internet access is limited.
Key Features
  • Applications, reports and MetaDefender Drive software can be updated over Wi-Fi and cellular networks to overcome the limitations of air-gapped environments.
  • Three hardware kill switches to physically disable wireless connectivity, Bluetooth, camera, microphone, and the cellular, MetaDefender Drive with Smart Touch ensures total control and zero risk to air-gapped networks and environments
Technologies
  • Bare Metal Multiscanning: Scans laptops and critical devices from bare metal to user space files and directories with multiple anti-malware engines
  • Country of Origin Detection: Checks the device’s software and flags anything that may violate country of origin compliance
  • Proactive DLP: Detects sensitive and confidential data such as credit card and social security numbers in documents, images, and videos.
  • Wireless Updates: Easily update software, scan engines signature and database over Wi-Fi or cellular networks
  • Enterprise Central Management: Securely integrates with My OPSWAT Central Management to provide automated report syncing, real-time monitoring, configuration, and actionable security insights. Reports can also be sent over Wi-Fi and cellular networks
  • Plug and Update Engines: Supports seamless engine updates by plugging it into a MetaDefender Kiosk™ — no workstation required.
  • Plug and Sync Reports: Automatically syncs scanning reports in isolated environments via MetaDefender Kiosk and My OPSWAT Central Management with on-premises integration — no internet required.
  • Centralized Scanning Profile: Ensures policy consistency while enabling remote real-time access and usage policy modifications with approvals using a one-time password.
  • Quickly deliver safety insights for any scanned device: Automatically provides clear recommendations to protect your organization’s security from transient devices.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard