Duke EnergyxOPSWATBuilt for Duke Energy's substations, control rooms, and the AMI 2.0 grid edge.

The Update You Can’t Afford to Skip: End of Support for Office 2016 & Office 2019

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

OT-Hardened File and Device Security
for Duke Energy's Substations and Beyond

1,300+ substations across NC, SC, FL, IN, OH, KY. AMI 2.0 grid edge. Purdue Model 3.0 modernization. NERC CIP-007, CIP-010, and NEI 08-09 alignment, in one platform.

NERC CIP-Aligned Platform

Substation File Scanning Aligned to CIP-007

CIP-010 Baseline Configuration Coverage

Control Room and AMI Device Coverage

Purdue Model 3.0 Hardening

Cross-Purdue File Flows From IT to OT

USB Sanitization for Substation Field Crews

Historian and IIoT Ingest in One Stack

Trained for Duke's Operators

Certified Curriculum for Substation Field Crews

SOC Analyst Pathways for OT Security

NERC CIP and NEI 08-09 Lab Coursework

1,300+

Substations Covered

100%

NERC CIP Alignment

0

Zero-Day Execution Events

Recommended Webinars

Protecting the Industries
the World Runs on

Energy. Banks. Defense Networks. Factory Floors.

Critical infrastructure is any system the world depends on. Built to the standards of national defense and global
enterprise, OPSWAT is the firewall of data for the world's most critical networks.

Financial Services

Financial Services

Secure customer data, transaction systems, and regulatory compliance with multi-layered file and email threat prevention.

Energy & Utilities

Energy & Utilities

Secure SCADA, OT networks, and substation file transfers across Duke's NC/SC/FL/IN/OH/KY footprint, aligned to NERC CIP-007 and CIP-010.

Government & Defense

Government & Defense

Protect classified and sensitive networks with cross-domain solutions, endpoint compliance, and threat prevention validated to government standards.

Manufacturing

Manufacturing

Prevent production disruption from file-borne and device-borne threats targeting industrial control systems and operational networks.

Secured Perimeter and Data Workflows
for Any Organization

OPSWAT secures data flows to and from critical networks, protected by layered threat prevention, AI-powered prediction and content verification, and continuous vulnerability intelligence, all through the MetaDefender platform.

File Security

Prevent file-borne malware from reaching production systems. MetaDefender scans, sanitizes, and verifies every file before it's trusted.

Peripheral and Removable Media Protection

Control what enters your critical environment through USB drives, portable devices, and transient assets with kiosk-based scanning and compliance enforcement at the perimeter.

Managed File Transfer

Move files securely across network boundaries with built-in threat prevention, policy enforcement, and full audit trails, without exposing sensitive environments.

Data Diode and Security Gateway Solutions

Enable hardware-enforced unidirectional data transfer between network segments. OPSWAT data diodes and security gateways protect air-gapped and segmented networks with zero risk of reverse data flow.

Storage Security

Scan and sanitize files in cloud storage, on-premises repositories, and file-sharing platforms, preventing malware and data leakage without disrupting workflows.

Email Security

Neutralize weaponized attachments and embedded threats before they reach the inbox. Deep CDR™ Technology and Metascan™ multiscanning technologies applied to every inbound message.

Access and Endpoint Security

Assess and enforce device posture before granting network access. The OESIS Framework gives security vendors and IT teams the tools to verify endpoint compliance across managed and unmanaged devices.

File Security

Prevent file-borne malware from reaching production systems. MetaDefender scans, sanitizes, and verifies every file before it's trusted.

Peripheral and Removable Media Protection

Control what enters your critical environment through USB drives, portable devices, and transient assets with kiosk-based scanning and compliance enforcement at the perimeter.

Managed File Transfer

Move files securely across network boundaries with built-in threat prevention, policy enforcement, and full audit trails, without exposing sensitive environments.

Data Diode and Security Gateway Solutions

Enable hardware-enforced unidirectional data transfer between network segments. OPSWAT data diodes and security gateways protect air-gapped and segmented networks with zero risk of reverse data flow.

Storage Security

Scan and sanitize files in cloud storage, on-premises repositories, and file-sharing platforms, preventing malware and data leakage without disrupting workflows.

Email Security

Neutralize weaponized attachments and embedded threats before they reach the inbox. Deep CDR™ Technology and Metascan™ multiscanning technologies applied to every inbound message.

Access and Endpoint Security

Assess and enforce device posture before granting network access. The OESIS Framework gives security vendors and IT teams the tools to verify endpoint compliance across managed and unmanaged devices.

MetaDefender AI-Powered Platform

MetaDefender is OPSWAT's AI platform for critical infrastructure protection — where all data is scanned, sanitized, verified, and controlled before it moves deeper into an environment. OPSWAT delivers zero trust, prevention-first cybersecurity that secures data movement and workflows across Cloud, IT, OT, and Cross Domain environments. OPSWAT's AI is embedded natively across the platform, making threat prevention faster, more proactive, and capable of stopping AI-generated threats that legacy tools can't see.

Explore the Platform

Hover to interact with
Purdue Model

MetaDefender Technology Stack

Most cybersecurity vendors are building AI to triage alerts faster, orchestrate responses, or protect AI models themselves. OPSWAT builds AI to prevent threats at the data layer — stopping malicious content before it executes, not after it is detected.

OPSWAT layers Deep CDR™ Technology, Metascan™ Multiscanning, AI-driven threat prediction, Adaptive Sandbox, and AI-powered content verification technologies to prevent, detect, and neutralize threats before they execute.

Predictive Alin AI

Built for Prediction,
Engineered for Speed

  • Deep file structure analysis
  • ML-Model trained on zero-day threats
Metascan Multiscanning

30+ AV Engines Reviewing Every Vendor File

  • Every vendor file scanned before it touches a substation HMI
  • Combined signatures, heuristics, and ML across 30+ leading engines
99.2% detection
with Max Engines package
Deep CDR™ Technology

Sanitize PDFs, Firmware Archives, and PLC Project Files

  • Disarm weaponized vendor firmware before it crosses the IT/OT boundary
  • Recursively sanitize nested archives and HMI project bundles
  • Regenerate safe, usable files for substation operators
100% Protection Score
from SE Labs
Proactive DLP

TAA-Aligned Country-of-Origin and DLP Coverage

  • TAA-aligned country-of-origin checks on every file Duke ingests from third-party vendors
  • Auto-redact PII, PHI, and customer data across 125+ file types
  • OCR for image-based document review across grid programs
125+
Supported file types
OCR
image to text recognition
Adaptive Sandbox

Detonate Suspect Binaries Before They Reach Duke's OT Network

  • Anti-evasion sandbox engine extracts IOCs from PLC firmware and HMI bundles
  • Pre-execution detonation prevents zero-day events on Duke's operational network
  • API and local integration for substation and control room workflows
100x more resource efficient
than other sandboxes
< 1hr setup
and we’re working to help protect you from malware
Threat Intelligence

Enhance Detection with Real-Time Threat Intelligence

  • Correlate global IOCs, IPs, URLs, & file reputation across 50B+ artifacts
  • Stop emerging threats faster
  • Enrich downstream analysis
Faster
Speed up overall triage time
Transparent
Defend critical environments with greater clarity
OPSWAT Technologies Image
File-Based Vulnerability Assessment

Detect Application Vulnerabilities Before They Are Installed

  • Check software for known vulnerabilities before installation
  • Scan systems for known vulnerabilities when devices are at rest
  • Quickly examine running applications and their libraries for vulnerabilities
3M+
Data Points Collected from Active Devices
30K+
Associated CVEs with Severity Information

Trust No File. Trust No Device.

Every Duke substation file and device, scanned and verified by one platform.
No bolt-ons. No separate SKUs. No acquisitions to integrate.

Built to the Standards That Govern Duke Energy's Substations and Beyond

The MetaDefender Platform is pre-validated against NERC CIP-005, CIP-007, and CIP-010, NEI 08-09 Rev 6 for Duke's nuclear fleet, NIST CSF 2.0 and NIST 800-53, plus CMMC 2.0, ISO 27001, Common Criteria, and SOC 2.

NERC CIP
NEI 08-09
NIST CSF
ISO 27001
SOC 2
Common Criteria / CMMC

Deploy Across Duke's Fleet.
Protect Every Substation.
Reduce the Burden on Field Crews.

OPSWAT rolls out across all 1,300+ Duke substations from a central console. Automated workflows, unified policy management, and central CIP-007 / CIP-010 evidence collection mean a single CISO team supervises every site. AI engines operate inline and autonomously, requiring no additional integration in the field.

The Organizations That Trust OPSWAT to
Protect What Matters Most

ABOUT

Hitachi Energy is a global technology company specializing in providing advanced energy solutions and services.

USE CASE

Hitachi Energy hardened its OT boundary across its global substation fleet with OPSWAT MetaDefender Core and MetaDefender K2100 Mobile Kiosks — the same path Duke Energy is on with AMI 2.0 and Purdue Model 3.0 modernization. Jeremy Morgan shares how the program transformed last-mile vendor-file and USB security at the substation perimeter.

ABOUT

Indeed is the world’s #1 job site, with 635 million job seeker profiles across 60+ countries and more than 3.3 million employers using the platform to hire. The company is part of Recruit Holdings, a global leader in HR technology and business solutions.

USE CASE

With millions of files uploaded daily, Indeed needed stronger protection against malware and other file-borne threats that could be embedded in uploads. By implementing OPSWAT’s multiscanning technology through MetaDefender Core, Indeed enhanced file upload security and reduced the risk of malicious files reaching its platform.

PRODUCTS USED:

ABOUT

Dounreay Site Restoration Limited (DSRL) is a nuclear research and development site that has been at the forefront of fast nuclear reactor development in the United Kingdom for five decades.

USE CASE

DSRL encountered significant cybersecurity challenges during decommissioning, stemming from an outdated file security system with manual scanning, limited threat detection, and lengthy validation times. By implementing OPSWAT MetaDefender solutions, they revolutionized their file security, to detect and remove potential threats and expedite the validation process.

ABOUT

Genesis Energy, one of New Zealand’s largest electricity and natural gas providers, powers homes and businesses through a diverse mix of thermal, hydro, wind, solar, and battery assets—including the 240 MW Tokaanu Power Station—while driving the country’s shift to sustainable energy.

USE CASE

Genesis Energy faced security risks from unmanaged removable media and transient devices in its OT environments. By deploying MetaDefender Drive and Kiosk, the company closed these gaps—protecting against cyber threats and ensuring safe, reliable energy delivery to over 650,000 connection points across New Zealand.

Awards and Recognition

Intelligence From the Front Lines of Substation and Grid Defense

How Duke-Class Utilities Harden the AMI 2.0 Grid Edge

Smart-meter, DERMS, and distribution automation file flows, scanned and TAA-checked before they reach the grid edge.

Substation File Workflows: From Vendor USB to Historian

The end-to-end path of a vendor file at a multi-state utility, from USB at the gate to OSIsoft PI historian.

SANS Detection & Response Survey

Uncovering the widening gaps caused by endpoint-heavy security postures, rising complexity, and inconsistent intelligence sharing.

Common Questions About OPSWAT

Yes. MetaDefender for Secure Storage scans every file ingested into Duke's OT historian, including OSIsoft PI and GE Proficy archive files, before write. Deep CDR sanitizes vendor uploads and PLC project files in line, with no operator workflow change.

MetaDefender OT Security maintains baseline configurations on every Duke substation HMI, PLC, and engineering workstation, with file-level audit trails that map directly to CIP-010 R1 and R2 evidence. Every change is logged, hashed, and reportable for the regional reliability auditor.

Yes. MetaDefender NetWall data diodes provide hardware-enforced unidirectional transfer between Duke's IT corporate network and air-gapped substation OT networks. MetaDefender Kiosk scans every USB before it crosses the boundary, and MetaDefender Drive verifies field laptops and engineering workstations before re-entry.

OPSWAT deploys MetaDefender as a centrally managed platform across all 1,300+ Duke substations, with a phased rollout that starts at the regional control center, extends to the Catawba, McGuire, Oconee, and Brunswick nuclear sites, and rolls out to the AMI 2.0 grid edge. Central policy management means one CISO console, not 1,300 boxes to babysit.

MetaDefender Kiosk K2100 Mobile units sit at the substation entry point and scan every USB, vendor laptop, and removable drive before a Duke field crew brings it past the perimeter. Sanitized files are delivered to the substation HMI in seconds, with a NERC CIP-007 R3 audit trail logged centrally.

Yes. MetaDefender Proactive DLP and Country of Origin scanning checks every vendor firmware bundle and PLC project file Duke ingests against a TAA-aligned country-of-origin policy. Files flagged for non-TAA origin are quarantined and routed for review before they reach the OT network.

Yes. MetaDefender is the file and device security stack used at multiple US and international nuclear sites, validated against NEI 08-09 Rev 6, NRC CFR 73.54, and FERC requirements. Coverage extends across plant control room workstations, security perimeter media, and contractor laptop entry.

OPSWAT extends MetaDefender file and device scanning to Duke's AMI 2.0 grid-edge endpoints, including smart meters, distribution automation gateways, and DERMS controllers. Every firmware update and configuration push gets multi-engine scanned, sanitized, and TAA-checked before deployment to the field.

Ready to Protect Duke Energy's Substations?

30 minutes. AMI 2.0 grid edge to control room.
NERC CIP-007, CIP-010, and NEI 08-09 in one platform.

Hi! 👋 Need help?

Ozzy - a few moments ago

0

Hey there!

I'm Ozzy, your OPSWAT virtual assistant. How can I help you secure what's critical today?