Deterministic · OT-Native · Fail-Closed
Inspection Pipeline
Five stages. One verdict. No exceptions.
Every file, regardless of source, format, or form factor, passes through the same fixed inspection sequence. The pipeline is deterministic: the same inputs always produce the same outputs. There is no shortcut, no trusted source bypass, no exemption list.
1
Static Analysis
Pattern-based inspection of file structure before any execution. Identifies known malware signatures, suspicious encoding, and embedded threats in file headers and metadata.
2
Multi-Engine Scanning
Parallel inspection across 17+ independent scanning engines simultaneously. No single engine is the arbiter. Consensus across multiple detection approaches eliminates single points of failure.
3
Content Disarm and Reconstruction (CDR)
Files are not just scanned, they are rebuilt. Active content, macros, embedded objects, and exploit vectors are removed. The output is a safe, functional file that carries no threat payload. Original threat is destroyed, not quarantined.
4
Reputation Validation
Hash validation against global threat intelligence databases, OT-specific malware repositories, and industrial control system attack pattern libraries. Every file checked against what is already known.
5
Deterministic Verdict
One outcome. Clean. Hold. Blocked. No probabilistic scoring. No ambiguity. The same file always receives the same verdict. Every outcome is logged, traceable, and auditable.


Fail-closed by design.
If Media Scan cannot reach a verdict, connectivity issue, unrecognised format, inspection engine error, the file is held, not passed. The default is control, not convenience. A file that cannot be inspected does not enter your environment.
Full audit trail, every file.
Every file generates a timestamped audit record: source, format, inspection stages completed, verdict issued, disposition applied. The log is complete, immutable, and exportable. Compliance evidence is produced automatically, not assembled after the fact.
Media Scan
Traditional AV / Scanning Tools
Verdict type
Deterministic, same file always same outcome
Probabilistic, score-based, variable by engine version
Fail mode
Fail-closed, unknown files are held
Fail-open, unknowns often pass
Content handling
CDR rebuilds files, active content destroyed
Files scanned in place, threats may remain embedded
OT protocol support
Native OT file format support (.bin, .s7p, .acd, .dat, and more)
IT-focused formats, OT support varies
Audit trail
Full per-file audit log with timestamps
Partial, event-level logging only
Deployment
Air-gap, on-premise, inline virtual, all supported
Cloud or on-premise, air-gap typically unsupported
Workflow enforcement
Enforced, files cannot bypass inspection
Advisory inspection is recommended, not enforced






