Enhanced Data Flow Control with Metadefender
We have just released MetaDefender version 3.0.7, closing out a great year of enhancements to this product. This release includes updates to the devices able to be processed by MetaDefender, as well as new features for scan logging and results.
Continuing our progress from the last release of MetaDefender, we have enhanced support for encrypted USB drives, adding support for Buffalo SecureLock and enhancing support for Kingston DataTraveler. Users will now be able to have these encrypted devices processed by MetaDefender, expanding the range of devices.
An exciting new feature for many of our customers is the ability to save the logs from a MetaDefender session onto the media device that was processed. MetaDefender administrators can enable this option to ensure that session logs are copied to the USB device after the session finishes; these logs can then be used to prove that a device's files were processed and what the results of MetaDefender's analysis were. This feature provides another option for customers to build a simple workflow that ensures the security of data entering a network. Administrators can also now configure MetaDefender to automatically print the receipt of a session when the session finishes.
Additional changes in this release of MetaDefender include an expansion of the information available when a file scan fails, as well as new HTML documentation available through the MetaDefender Management Console.
Check out the latest version of MetaDefender on the OPSWAT Portal, and contact us if you have any questions.
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 145
- Company Culture 15
- CVEs 288
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 137
- Product Announcements 355
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?