A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense. Credit: OPSWAT Infrastructure protection vendor OPSWAT has announced the availability of its new MetaDefender Kiosk K2100 hardware, designed to provide a mobile option for users who want the company’s media-scanning capabilities to work in the field.OPSWAT’s MetaDefender line of kiosks is designed to address a potential security weakness for critical infrastructure defended by air gaps. In order to patch those systems, audit them, or move data among them, removable media like SD cards, USB sticks and sometimes even DVDs are used by field service personnel.The vulnerability of the removable media is, therefore, a potential problem, according to OPSWAT vice president of products Pete Lund, not least in the sense that that media could be used to move sensitive information off of critical infrastructure. “Oftentimes in OT [operational technology], you’ll have third-party contractors, and oftentimes they need to take data off of the machines,” he said. “What we can do is scan information coming in and coming out for PII, hostnames, anything that’s sensitive data … and sanitize files for that.” The MetaDefender Kiosk line also scans files on removable media using up to 30 different antivirus protection applications, as well as checking through binaries and executables for vendor and version info, to determine whether they could introduce vulnerabilities into protected systems.Moreover, MetaDefender uses content disarm and reconstruction technology to protect against zero-day attacks, Lund noted. “So oftentimes, zero-days will include things that matches specific pattern, like you have a PDF or a Word document with something embedded into it,” he said. “And we … think about the use case of a contractor who goes to maybe a vendor website, downloads a PDF, but what if this is actually a watering hole website where that PDF has been weaponized?”Hence, the CDR (content disarm and reconstruction) technology in the MetaDefender system is designed to rebuild a PDF or Word document to remove any code or macros that don’t need to be there.Lund said that the target customers are mostly in the manufacturing, chemical processing, energy and oil industries — but that the system is applicable to any organization that has a geographically dispersed or outdoor component to their operations.“The other side is folks doing digital evidence collection, so folks in either the armed forces or military who are picking up potential criminally used laptops, thumb drives, phones,” he said. “We have the ability to scan, ultimately, anything.”The K2100 can be ordered from OPSWAT as of now, with shipments expected to start going out later in the first quarter. The product is available in either a perpetual model — where the hardware can be bought outright, with licensing fees for the AV engines and different capabilities — or as a subscription leasing model with an annual use fee. Related content news Google launches Google Threat Intelligence at RSA Conference The new addition to Google Cloud Security is designed to give security teams information to inform approaches to protecting against external threats, managing attack surfaces, and mitigating digital risks. By Sascha Brodsky May 06, 2024 4 mins Google Cloud Functions Cloud Security Security Software brandpost Sponsored by Elastic Search + RAG: The 1-2 punch transforming the modern SOC with AI-driven security analytics AI is modernizing how SOCs function, triaging countless alerts down to a handful of attacks that matter most. By Mike Nichols, Product for Security at Elastic May 06, 2024 3 mins Artificial Intelligence how-to Download the Zero Trust network access (ZTNA) enterprise buyer’s guide From the editors of our sister publication Network World, this enterprise buyer’s guide helps network and security IT staff understand what ZTNA can do for their organizations and how to choose the right solution. By Josh Fruhlinger and steve_zurier May 06, 2024 1 min Zero Trust Access Control Network Security news Germany blames Russian hackers for months-long cyber espionage The attacks by Russia-backed Fancy Bear used an Outlook exploit to compromise several German officials’ accounts. By Shweta Sharma May 06, 2024 4 mins Advanced Persistent Threats Hacker Groups PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe