We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

MetaDefender Core

Advanced Threat Prevention Solution

MetaDefender Core enables you to integrate advanced malware prevention and detection capabilities into your existing IT solutions and infrastructure for better handling common attack vectors: securing web portals from malicious file upload attacks, augmenting cybersecurity products, and developing your own malware analysis systems.

Ever-Evolving Cyberattacks

Cyberattacks become ever-more sophisticated. Cyberthreats are incessantly evolving and being built to evade traditional signature-based and behavior-based anti-malware defenses. Nowadays your IT and OT infrastructures need advanced multi-layer threat prevention to beat zero-day attacks, advanced persistent threats (APT) and highly evasive malware.

Detect, Analyze, and Eliminate Malware and Zero-Day Attacks

  • Quickly scan all files with top 30+ antivirus engines and detect over 99% of known malware.

    Recursively sanitize 200+ file types with market leading Deep CDR technology and remove 100% of potential threats.

    Remove, redact, or watermark sensitive data in files before it enters or leaves your network.

    AI-powered Document Classification detects adult content in images and offensive language in text.

    Uncover vulnerabilities in installers, binaries, or applications before they are installed and plug any security holes.

    Identify malicious domains and IPs in documents and block files in near real-time using curated threat intelligence from multiple sources.

    Gain granular visibility into your workloads with My OPSWAT. Access detailed inventory data, instance health insights, connection status, and licensing information.

    Automated and actionable reports identify risks associated with users and services for quick remediation actions.

  • Detect zero-day malware and more Indicators of Compromise (IOCs) with adaptive threat analysis technology.

    Configure workflow and analysis rules based on user, business priority, file source, and file type to meet your specific security requirements.

    Generate a software bill of materials (SBOM) and quickly find vulnerabilities in source code and containers.

    Reputation Engine matches file hashes against database of known good and bad files and leverages advanced analyses to remediate false positives faster.

    Identify file origins and manage access to restricted locations and vendors instantly for regulatory compliance and data protection.

  • Quickly scan all files with top 30+ antivirus engines and detect over 99% of known malware.

  • Recursively sanitize 200+ file types with market leading Deep CDR technology and remove 100% of potential threats.

  • Remove, redact, or watermark sensitive data in files before it enters or leaves your network.

  • AI-powered Document Classification detects adult content in images and offensive language in text.

  • Uncover vulnerabilities in installers, binaries, or applications before they are installed and plug any security holes.

  • Identify malicious domains and IPs in documents and block files in near real-time using curated threat intelligence from multiple sources.

  • Gain granular visibility into your workloads with My OPSWAT. Access detailed inventory data, instance health insights, connection status, and licensing information.

  • Automated and actionable reports identify risks associated with users and services for quick remediation actions.

  • Detect zero-day malware and more Indicators of Compromise (IOCs) with adaptive threat analysis technology.

  • Configure workflow and analysis rules based on user, business priority, file source, and file type to meet your specific security requirements.

  • Generate a software bill of materials (SBOM) and quickly find vulnerabilities in source code and containers.

  • Reputation Engine matches file hashes against database of known good and bad files and leverages advanced analyses to remediate false positives faster.

  • Identify file origins and manage access to restricted locations and vendors instantly for regulatory compliance and data protection.

Prevent Zero-Day and Advanced Evasive Malware

MetaDefender Deep Content Disarm and Reconstruction (Deep CDR) technology protects from known and unknown file-borne threats by sanitizing and reconstructing files. Any possible embedded threats are neutralized while maintaining full usability with safe content.

Rebuild 200+ common file types, hundreds of file reconstruction options are available.

Achieve Over 99% Threat Detection Accuracy

MetaDefender Multiscanning technology leverages 30+ leading anti-malware engines and proactively detects over 99% of malware by using signatures, heuristics, and machine learning. This significantly improves detection of known and unknown threats and provides the earliest protection against malware outbreaks.

Prevent Regulatory Compliance Violations & Detect Adult Content 

MetaDefender Proactive Data Loss Prevention (Proactive DLP) helps companies prevent sensitive and confidential information in files from leaving or entering the company’s systems by content-checking files before they are transferred. This helps enterprises meet regulatory requirements like HIPAA, PCI-DSS and GDPR. Proactive DLP detects adult content in images and offensive language in text using machine learning, computer vision, and AI.

MetaDefender Proactive DLP supports 110+ file types, including Microsoft Office, PDF, CSV, HTML and image files.

Detect Application and File-Based Vulnerabilities

MetaDefender File-Based Vulnerability Assessment technology scans and analyzes binaries and installers to detect known application vulnerabilities before they are executed on endpoint devices, including IoT devices.

It gives IT administrators the ability to:

  • Check certain types of software for known vulnerabilities before installation
  • Scan systems for known vulnerabilities when devices are at rest
  • Quickly examine running applications and their loaded libraries for vulnerabilities

100+ File Conversion Options

Use the file type conversion functionality to flatten files to fewer complex formats. MetaDefender enables administrators to specify that certain file types are converted to other files types (e.g. Microsoft Word documents to PDF). By adding this step to the data processing workflow, zero-day attacks where malicious objects are embedded into office documents or image files can be eliminated, even if they have the ability to evade detection by antivirus engines.

File Type Verification

With MetaDefender's file type verification technology, you can determine the actual file type based on the content of the file, not the unreliable extension to combat spoofed file attacks. You can also configure security processes based on true file type. For example, you can take more precautions with risky file types like EXE and DLL files —setting different policies or workflow rules based on file type.

A spoofed file usually indicates malicious intent, so to mitigate this risk, MetaDefender block files with incorrect extensions. For example, MetaDefender can prevent EXE or DLL files trying to pose as TXT files from entering your organization.

Faster False Positives Remediation

Reputation Engine matches file hashes against database of known good and bad files and leverages advanced analyses to remediate false positives faster.

Benefits of the Reputation Engine:

  • Advanced threat detection - Identify uploaded files as “known good”, “known bad” or “unknown” by matching hashes against database of known malicious or safe files.
  • Minimized false positives/negatives - Leverage advanced analyses conducted by malware analysts and reverse engineering experts for faster verdicts on suspicious files.

Curated Threat Intelligence for Near Real-Time Detection and Response

MetaDefender InSights Threat Intelligence engine detects known malicious domains and IP addresses in documents and enables real-time blocking of files based on malicious indicator detections. It applies high-quality, curated threat intelligence to extracted indicators, aggregating data from hundreds of sources to ensure the highest quality threat detection and response capabilities.

Adaptive Threat Analysis

Detonate and analyze malware in a controlled environment. MetaDefender utilizes MetaDefender Sandbox for a complete set of malware analysis technologies including, threat agnostic analysis of files and URLs, emulation of all targeted applications (Microsoft Office, PDF readers, and more), a focus on Indicator-of-Compromise (IOC) extraction, and Rapid Dynamic Analysis engine for targeted attack detection.

Sample: Geofencing, Targeted financial attack, Pafish UPX

Generate SBOM (Software Bill of Materials) 

OPSWAT SBOM secures the software supply chain by providing a comprehensive component inventory for source code and containers.

  • Supports 10+ languages, including Java, JavaScript, Go, PHP, and Python.
  • Supports 5M+ third-party open-source software components.
  • Utilizes a database of 17K+ vulnerabilities sourced from the National Vulnerability Database (NVD) and GitHub (GHSA).

Country of Origin

The OPSWAT Country of Origin engine empowers organizations to instantly detect the geographic source of uploaded files including PE, MSI, and Self-extract.

By analyzing digital fingerprints and metadata, it can identify restricted locations and vendors. This enables automated filtering that blocks unauthorized access to sensitive data while ensuring compliance with data regulations across regions.

Archive Extraction

MetaDefender currently supports archive scanning for over 30 types of compressed files. Archive handling options are configurable, and encrypted archives are supported.

Benefits of Archive Extraction:

  • Improve detection capabilities of anti-malware engines by using both extracted and unextracted scanning
  • Decrease scanning time and improve processing time by removing redundant scanning of archives
  • Prevent archive bombs by extracting files and scanning them individually

Workflow Engine

MetaDefender’s Workflow Engine allows administrators to create multiple workflows to handle different security policies based on users and file source.

Benefits of the Workflow Engine:

  • Improve Security - The workflow engine allows you to set the appropriate security level per user and file type and enables IT to make quick decisions on data security policy.
  • Enhance Performance - By blocking certain file types and setting the order of file processing, performance can be enhanced.
  • Prioritize Workflows - Users can define the priority and pre-defined scan times per workflow rule, optimizing business processes.
  • “We believe that OPSWAT and FileZen S are indispensable to our city in order to conduct operations that are safe and do not compromise efficiency.”

    Sho Sawada
    Chief of ICT Promotion Section , Planning and Finance Department, Muroran City Hall
  • “OPSWAT’s was far superior compared to the sanitization engines proposed by other companies.”

    Kouji Daicho
    Senior Manager of the Information System Section,
    Digital Promotion Office, Fuji City
  • “With a CDR solution [like OPSWAT], we can be sure that files uploaded to our platform are clean of all malware.”

    Tamir Ronen
    Chief Information Security Officer, HiBob
  • “We’re using MetaDefender there to scan everything as we build it, to make sure we’re not becoming that supply chain risk.”

    Jeremy Morgan
    Global Cybersecurity Manager at Hitachi Energy

Easy to Deploy, Unrivaled Expertise

Data Privacy Compliance

MetaDefender Core can be deployed on-premises which enables offline analysis of files. In the MetaDefender Cloud platform, your files will be processed privately in a temporary storage and removed immediately after the analytical report is finished.

Simple Deployment

Fast implementation both on-premises and in the cloud via REST API, Webhook or any Internet Content Adaptation Protocol (ICAP) enabled product. Support for both Windows and Linux.

Expert Professional Services

Access to cybersecurity experts to adapt the solution to your existing infrastructure and unique requirements. 24/7 support is available to keep operational at all times.

Centralized Management

From a centralized console, you can perform global operations, view all deployed anti-malware engines, manage virus definition and engine updates, and check licensing status.

High Performance and Scalability

Scale to any volume with our high-performance architecture and load balancing feature. Fast scanning and reconstruction without affecting performance.

Low Total Cost of Ownership

Single-source licensing through OPSWAT helps enterprises avoid complex, costly and time-consuming implementation and management of different vendors.

Maximize Your Protection

Protect Web Portals from Malicious File Uploads

MetaDefender Core prevents malicious file uploads on web applications that bypass sandboxes and other detection-based security solutions. It also helps protect confidential data, minimize data breaches, and prevent privacy violations with Proactive DLP.

Perform Malware Analysis Safely and Effectively

MetaDefender Core’s multi-layer malware detection and analysis technologies help you to quickly and effectively triage and respond to security incidents, find the root cause of cyberattacks, and improve your defenses. It can be deployed on-premises, enabling offline analysis of malicious files to keep sensitive files private and scan results confidential.

Enhanced Threat Prevention for Security Products

Use MetaDefender Core to reinforce your security solution with OPSWAT advanced threat prevention technologies. We provide sample code and detailed API documentation to help you bootstrap your integration. You can use almost any programming language to leverage MetaDefender technology with our APIs to help your developers get their prototypes done quickly without an additional learning curve.

  • “OPSWAT is a valuable partner to Zendesk. MetaDefender Core helps us test attachments and identify malware which builds customer trust. OPSWAT is a trusted partner we confidently rely upon.“

    The logo of Zendesk, who uses OPSWAT technology to test attachments and identify malware.
    Hemant Kataria
    Sr. Director of Engineering, Zendesk
  • “The overall solution meets the requirements for cleaning files before being used in the production environment in both IT and OT environments. This increases reliability and reduces security risks in the customer’s environment.”

    Thai Duc Phuong
    Cyber Security Solution Specialist 

Recommended Resources

  • Datasheet

    MetaDefender Core Datasheet

    MetaDefender Core enables you to integrate advanced malware prevention and detection capabilities into your existing IT solutions and infrastructure for better handling common attack vectors

  • Documentation

    MetaDefender Core Documentation

    Step by step instructions on installation, configuration, and daily operations of MetaDefender Core

  • Licensing Options

    MetaDefender Core Licensing Options

    MetaDefender enterprise solutions are built to protect critical infrastructure. Get started with MetaDefender for file upload security and malware analysis today.

  • Blog

    MetaDefender Core Standalone Deployment Performance

    Explore OPSWAT MetaDefender Core’s enhanced performance on Linux and Windows for robust cybersecurity in our latest efficiency report.

Learn How MetaDefender Core Helps Protect Your Critical Infrastructure