可移除Media 漏洞威脅企業營運
Data is critical to this organization’s operations. Data and system files are required throughout the network tiers and high-risk zones to support operational, security, and other critical tasks, and in many cases must move across air-gapped environments. Isolation is an essential safety control in nuclear environments, helping maintain operational integrity while protecting people, assets, and the environment.
In our estate, removable media and transient devices are an unavoidable conduit between secure and less-trusted domains in order to perform updates and diagnostics.
Head of OT Cyber Security and Cyber Assurance
To meet security protocols and protect the environment, the organization previously relied on multiple manual checks and traditional procedures involving staff oversight and documentation.
Several key concerns needed to be addressed:
檔案安全
Malicious files can covertly infiltrate nuclear facilities and undermine secure operations. Supply-chain risks, including tampered software, altered firmware, and corrupted third-party data, can further increase exposure to cyber infiltration and potential sabotage.
Removable Media Proble
USB drives, SD cards, and similar devices can introduce malware, enable unauthorized data extraction, and bypass existing network security safeguards. They also create auditability challenges and pose risks to the integrity of content stored on removable media.
瞬態裝置風險
Laptops, maintenance devices, and contractor systems can introduce threats, unverified configurations, or hidden access paths when connected to secure networks.
核能監管
Compliance with strict regulatory requirements is a core driver for ensuring robust operational and cybersecurity safeguards around file security and removable media protection. In the nuclear sector, this extends beyond regulatory compliance. Organizations have a responsibility to maintain the highest levels of security, as even minor disruptions or deviations can have significant safety, environmental, and national-security consequences.
營運流程
Previously, the organization’s facilities operated with varying procedures, vendors, and legacy practices. Multiple manual checks made it difficult to scale processes while maintaining quality and compliance. Staff often needed to physically scan and transport media across large facilities several times, creating delays, operational fatigue, and an increased risk of human error. Teams urgently needed a standardized approach that could be applied consistently across all sites.
Manual release controls for files entering operational environments helped prevent outbreaks but added additional burden and increased the risk of mistakes in critical security and safety processes.
Strengthening Global Controls
We required greater control, security, and visibility into files as they cross all the boundaries. We needed to modernize and simplify our procedures and orchestrate many of the processes that are currently in place.
Head of OT Cyber Security and Cyber Assurance
Leadership has come to the conclusion that modernization, simplification, and better orchestration of their existing procedures were inevitable. To address these challenges, the organization selected OPSWAT because its integrated platform provided a comprehensive solution capable of securing files, removable media, and transient devices across their operational environments.
By deploying the integrated OPSWAT platform across all global facilities, the organization ensured that every file entering the nuclear environment was subject to zero-trust inspection workflows. Regardless of source or entry point: removable media, transient devices, onsite staff, or external third parties, all files were then processed through multi-layered defense controls to detect known and unknown threats targeting their environment.

This was achieved by implementing MetaDefender Kiosk™ (as integrated sheep dips) and MetaDefender Drive™ at established checkpoints for scanning removable media and transient devices before they entered the environment.
Each solution leverages a powerful set of technologies to keep malicious content out of the environment, including:
- 使用多個反惡意軟體引擎進行Multiscanning
- Full archive inspection and extraction
- Deep CDR™ Technology
- 原產地檢查
- File vulnerability scanning
- Intelligent reputation services
This multi-layered approach enforced consistent file security standards at the required performance level while maintaining operational efficiency, even when multiple engines were applied during scanning.

每個人的工作已經夠辛苦了,何況還要花半小時等待USB 掃描。但OPSWAT 這樣,即使啟用多個引擎,其強大的後端套件仍能維持高效運作。
Head of OT Cyber Security and Cyber Assurance
MetaDefender Kiosk delivered quick, reliable verification of all removable media, closing a significant security gap around USB devices. The MetaDefender Drive deployment served as a supply chain assurance tool used to scan vendor laptops before they were granted access.
With the MetaDefender Validation Endpoint, we’ve eliminated trust-based assumptions by ensuring only approved encrypted USBs and clean, scanned, unaltered files were allowed on critical endpoints.
Head of OT Cyber Security and Cyber Assurance
The OPSWAT solutions delivered orchestrated and flexible scanning through both free-standing and mobile kiosk formats, fitting seamlessly into business and security workflows.
Key Capabilities:
- 集中管理以實現一致的部署與控制
- 可靈活調整以適應營運需求的自助服務亭格式
- 跨所有環境的精簡稽核與可視性
- 輕鬆實施,僅需最低限度的培訓
- 縮短新用戶與團隊的入職時間

花費數分鐘執行掃描,能顯著降低發生嚴重系統問題的風險。相較於可能耗費數週時間從重大故障中恢復,這短暫的掃描時間實屬微不足道的付出。
Head of OT Cyber Security and Cyber Assurance
The deployment has been strongly endorsed across the organization, from frontline teams to senior leadership.
擴大戰略夥伴關係
The organization expanded its investment with OPSWAT to include the MetaDefender Managed File Transfer™ solution to drive efficiency and reduce operational risks in users’ daily tasks.
Files will be ingested from USB devices, internal file transfers, and third-party uploads into MFT, where they will be continuously scanned for threats and any suspicious files will be detonated within the solution’s inline sandbox capability.
Additional technical controls such as release management and supervisor approval will ensure outbreak prevention before file access is granted or securely transferred across domains.
The solution will function as a secure global file exchange platform for both internal teams and external partners, enabling security to support the business while enhancing productivity.

OPSWAT 的合作夥伴OPSWAT 我們在全球核能營運中保護與管理檔案的方式,賦予我們所需的控制力、可視性與一致性。我們期待見證這段關係將引領我們走向何方,以及它如何持續強化我們的協作關係。
Head of OT Cyber Security and Cyber Assurance
Driven by a mission to protect the world’s critical infrastructure, OPSWAT’s integrated solutions protect sensitive IT and OT environments from cyberattacks, ensure operational continuity, and support regulatory compliance. To learn more about these solutions and how they can secure critical infrastructure networks, get in touch with an expert today.
