We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Portable Malware Scanning

Portable Malware and Compliance Scanning

Scan laptops, desktops, and servers before they power on or are received, even in air-gapped environments

  • Pre and Post Boot Threat Scanning
  • Scan with 7 Anti-Malware Engines
  • Country of Origin Compliance
0 0 0 0 0 0 0 0 0 ;
Portable Malware Scanning Solutions Hero
Portable malware scanning drive smart touchPortable malware scanning drive smart touch screen 1Portable malware scanning drive smart touch screen 2Portable malware scanning drive smart touch screen 3
Portable malware scanning usbPortable malware scanning desktopPortable malware scanning server

1,900+

Global Critical Infrastructure Customers

Portable Malware Scanning for All Devices

20+ Years of Cybersecurity Innovation

TAA & FIPS 140-2

Compliant

17 Offices Worldwide

#1 Market Leader

Multiscanning & Deep CDR Technology

3 Category Winner

What We’re Up Against

Zero-Day & Boot Sector Viruses

Traditional antivirus solutions often miss deeply embedded threats such as rootkits or malware hidden in the MBR (Master Boot Record) or partition boot sector. MetaDefender Drive scans at the hardware level to detect and neutralize these threats.

Transient Device Protection

Perform comprehensive bare metal scans at the hardware level to detect and neutralize threats, ensuring that all transient devices are secure and safe to use.

Compliance Requirements

Meeting strict cybersecurity mandates, such as ISO/IEC 27001 and NIST SP 800-53, can be challenging. MetaDefender Drive helps organizations comply with these regulations by assessing the security of devices before they are introduced into secure environments.

Cross-Platform Compatibility

In OT and critical infrastructure, many devices run on outdated or legacy operating systems, alongside newer IT assets. The aging systems could not support modern endpoint security, leaving critical assets exposed. MetaDefender Drive scan the most recent and legacy devices across all major operating systems to close this gap and ensure network integrity.

End-to-End Portable Malware Scanning

The risks associated with vendor and contractor devices connecting to critical networks require rigorous inspection. MetaDefender Drive scans laptops, desktops, and servers before power-on — even in air-gapped environments — to ensure every device entering your environment is safe from tampering, infection, or hidden threats.

  • Zero-Day Attacks

    Zero-Day & Boot Sector Viruses

    Traditional antivirus solutions often miss deeply embedded threats such as rootkits or malware hidden in the MBR (Master Boot Record) or partition boot sector. MetaDefender Drive scans at the hardware level to detect and neutralize these threats.

  • Transient Devices

    Transient Device Protection

    Perform comprehensive bare metal scans at the hardware level to detect and neutralize threats, ensuring that all transient devices are secure and safe to use.

  • Compliance

    Compliance Requirements

    Meeting strict cybersecurity mandates, such as ISO/IEC 27001 and NIST SP 800-53, can be challenging. MetaDefender Drive helps organizations comply with these regulations by assessing the security of devices before they are introduced into secure environments.

  • Compatibility

    Cross-Platform Compatibility

    In OT and critical infrastructure, many devices run on outdated or legacy operating systems, alongside newer IT assets. The aging systems could not support modern endpoint security, leaving critical assets exposed. MetaDefender Drive scan the most recent and legacy devices across all major operating systems to close this gap and ensure network integrity.

  • Malware Scanning

    End-to-End Portable Malware Scanning

    The risks associated with vendor and contractor devices connecting to critical networks require rigorous inspection. MetaDefender Drive scans laptops, desktops, and servers before power-on — even in air-gapped environments — to ensure every device entering your environment is safe from tampering, infection, or hidden threats.

End-to-End Portable Malware Scanning

MetaDefender Drive secure boots from a built-in OS, independent of the device's primary operating system. It performs an offline, bare-metal scan, targeting the device's hardware components, including the Master Boot Record and partition sectors, to detect and remove malicious code. Scan reports instantly show threats, vulnerabilities, and system risks, providing immediate security feedback and highlighting what needs remediation.

MetaDefender Drive

Portable Pre-Boot Malware Scanning for Transient
and Stationary Devices

MetaDefender Drive with Smart Touch

Portable Pre-Boot Multi-Device Scanning at the
Touch of a Finger

What Solution is Right for You?

Scroll to Zoom

MetaDefender Drive 2

Portable Pre-Boot Malware Scanning for Transient and Stationary Devices

MetaDefender Drive creates a portable perimeter, anywhere maintaining an airgap is critical. Perform a secure boot, bare-metal boot scan on computers and servers before they access critical networks.

  • No Software Installation on Asset Required
  • End-to-End Portable Malware Security
  • 1TB Storage Offering Expanded Archive Capacity and Improved Performance
  • Support for UEFI, GPT, Legacy BIOS
  • TAA and FIPS 140-2 Compliant
  • Localization Support in 12 Languages, including English, French, and Japanese

Security Compliance Ready

Self-Checking Secure Firmware

Made in the U.S.A.

Scroll to Zoom

MetaDefender Drive with Smart Touch

Portable Pre-Boot Multi-Device Scanning at the Touch of a Finger

MetaDefender Drive with Smart Touch scans and ensures all hardware, from new servers to vendor laptops, is safe to use before entering your environment.

  • Multiscanning up to 7 Trusted Engines
  • Physical Network Kill Switches
  • Zero Risk of Network Compromise During Operation
  • Enterprise Central Management
  • Sync Reports, Update Engines, and Applications over Wireless
  • No Software Installation Required

Touchscreen Display

No Software Install Required 

Wi-Fi & Cellular Connectivity

Made in the U.S.A. (Select Model)

Scan and Verify Devices Before They Power On

  • Plug It In

    Secure boot target device directly from MetaDefender Drive

  • Run Scan

    MetaDefender Drive performs bare metal Multiscanning with up to
7 engines

    Avira
    Bitdefender
    ESET
    K7 Security
    Trellix
    CrowdStrike
    AhnLab
  • View Reports

    Review scan results to identify exactly what requires remediation

  • Connect and Boot

    Use Wi-Fi or cellular to update engines and security on MetaDefender Drive with Smart Touch, then connect to the target device and securely boot from the Drive.

  • Run Scan

    With physical kill switches for air-gapped environments, securely boot your device directly from the Smart Touch for a full bare metal multiscanning with up to 7 engines.​ Includes 1TB of Storage for large archive scanning.

    Avira
    Bitdefender
    ESET
    K7 Security
    Trellix
    CrowdStrike
    AhnLab
  • View Reports

    • 5.7” screen to view the results ​of scans, directly on the Smart Touch interface.​
    • Streamlined, automated report syncing with My OPSWAT ​Central Management.
  • Drive

    • Plug It In

      Secure boot target device directly from MetaDefender Drive

    • Run Scan

      MetaDefender Drive performs bare metal Multiscanning with up to
7 engines

      Avira
      Bitdefender
      ESET
      K7 Security
      Trellix
      CrowdStrike
      AhnLab
    • View Reports

      Review scan results to identify exactly what requires remediation

  • Drive with Smart Touch

    • Connect and Boot

      Use Wi-Fi or cellular to update engines and security on MetaDefender Drive with Smart Touch, then connect to the target device and securely boot from the Drive.

    • Run Scan

      With physical kill switches for air-gapped environments, securely boot your device directly from the Smart Touch for a full bare metal multiscanning with up to 7 engines.​ Includes 1TB of Storage for large archive scanning.

      Avira
      Bitdefender
      ESET
      K7 Security
      Trellix
      CrowdStrike
      AhnLab
    • View Reports

      • 5.7” screen to view the results ​of scans, directly on the Smart Touch interface.​
      • Streamlined, automated report syncing with My OPSWAT ​Central Management.

Explore the Platform

Hover to interact with
Purdue Model

End-to-End Hardware Protection

MetaDefender Drive ensures unverified devices are safe before they connect. By scanning transient laptops, desktops, and servers outside the operating system, Drive detects and removes malware, vulnerabilities, and integrity risks. Threats are eliminated, clean files are verified, and only trusted devices are allowed into secure or air-gapped environments.

“OPSWAT and MetaDefender Drive helps us control that, showing that anything that comes into our environment is clean.”

Alan Taylor
CSIA, Dounreay
Nuclear Restoration Services

Built with OPSWAT’s #1 Market-
Leading Technology

OPSWAT’s proven, globally trusted, and award-winning technology prevents threats to the hardware supply chain.

Metascan Multiscanning

More Engines Are Better Than One

  • Detect nearly 100% of malware
  • Scan simultaneously with 30+ leading AV engines
99.2% detection
with Max Engines package
Proactive DLP

Prevent Sensitive Data Loss

  • Utilize AI-powered models to locate and classify unstructured text into predefined categories
  • Automatically redact identified sensitive information like PII, PHI, PCI in 110+ file types
  • Support for Optical Character Recognition (OCR) in images
110+
Supported file types
OCR
image to text recognition
Country of Origin

Enable Instant Detection of a File’s Geographic Source

  • Detect the geographic source of uploaded files, including PE, MSI, and  SFX (self-extracting archives)
  • Automatically analyze digital fingerprints and metadata to identify restricted locations and vendors
Avoid Compliance Fines
Trace the origin of files and removable media
File-Based Vulnerability Assessment

Detect Application Vulnerabilities Before They Are Installed

  • Check software for known vulnerabilities before installation
  • Scan systems for known vulnerabilities when devices are at rest
  • Quickly examine running applications and their libraries for vulnerabilities
3M+
Data Points Collected from Active Devices
30K+
Associated CVEs with Severity Information
  • Metascan Multiscanning

    More Engines Are Better Than One

    • Detect nearly 100% of malware
    • Scan simultaneously with 30+ leading AV engines
    99.2% detection
    with Max Engines package
  • Proactive DLP

    Prevent Sensitive Data Loss

    • Utilize AI-powered models to locate and classify unstructured text into predefined categories
    • Automatically redact identified sensitive information like PII, PHI, PCI in 110+ file types
    • Support for Optical Character Recognition (OCR) in images
    110+
    Supported file types
    OCR
    image to text recognition
  • Country of Origin

    Enable Instant Detection of a File’s Geographic Source

    • Detect the geographic source of uploaded files, including PE, MSI, and  SFX (self-extracting archives)
    • Automatically analyze digital fingerprints and metadata to identify restricted locations and vendors
    Avoid Compliance Fines
    Trace the origin of files and removable media
  • File-Based Vulnerability Assessment

    Detect Application Vulnerabilities Before They Are Installed

    • Check software for known vulnerabilities before installation
    • Scan systems for known vulnerabilities when devices are at rest
    • Quickly examine running applications and their libraries for vulnerabilities
    3M+
    Data Points Collected from Active Devices
    30K+
    Associated CVEs with Severity Information

Portable Malware Scanning That Helps You Stay Compliant

As cyberattacks and the threat actors that carry them out become more sophisticated, governing bodies around the world are implementing regulations to ensure critical infrastructure is doing what’s necessary to stay secure. Failure to comply with these regulations put your organization at financial, reputational, and even physical risk. Portable Malware Scanning is critical to verifying devices before power-on and maintaining compliance with key global regulations.

Purpose-Built Supply Chain Security

Use case

Protecting Air-Gapped Networks

Use case

Protecting Air-Gapped Networks

A contractor’s laptop must be scanned before it connects to a SCADA system in a power plant. MetaDefender Drive performs a bare-metal scan, identifying a zero-day malware threat that traditional antivirus would have missed.

Use case

Verifying Server Integrity After Maintenance

Use case

Verifying Server Integrity After Maintenance

A server, recently patched, needs to be reintroduced into a secure air-gapped network. MetaDefender Drive with Digital Display scans the server to ensure that no malicious software or firmware has been introduced during the maintenance process.

  • Use case

    Protecting Air-Gapped Networks

    A contractor’s laptop must be scanned before it connects to a SCADA system in a power plant. MetaDefender Drive performs a bare-metal scan, identifying a zero-day malware threat that traditional antivirus would have missed.

  • Use case

    Verifying Server Integrity After Maintenance

    A server, recently patched, needs to be reintroduced into a secure air-gapped network. MetaDefender Drive with Digital Display scans the server to ensure that no malicious software or firmware has been introduced during the maintenance process.

Critical Protection for Critical Environments

  • Manufacturing

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Energy

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Financial

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Healthcare

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Pharmaceutical

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Public Sector

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Nuclear

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Water

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.
  • Transportation

    Discover how OPSWAT solutions are purpose-built to secure this critical sector from peripheral and removable media threats.

Critical Expertise for Critical Enviroments

OPSWAT offers purpose-built, innovative solutions to face the evolving cybersecurity challenges faced by our customers. Our team of subject matter experts bring years of experience in cybersecurity and risk mitigation to make sure you get the most out of those solutions.

Recommended Resources

  • Guide

    MetaDefender Drive Quick Start Guide

  • Datasheet

    MetaDefender Drive Datasheet

  • Toolkit

    MetaDefender Drive Toolkit

  • Whitepaper

    Strengthening Vendor Laptop Security

  • Brochure

    MetaDefender Drive Brochure

  • Whitepaper

    Demystifying the Hidden Risks of Relying on Live Antivirus Scanning in OT Environments

  • Customer Stories

    Securing Critical Operations for a Leading European Nuclear Energy Producer with OPSWAT

Start Preventing Attacks from
Unverified Devices Today!

Fill out the form and we’ll be in touch within 1 business day.
Trusted by 1,900+ businesses worldwide.