We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
MetaDefender Aether for Core

Zero-Day Detection
for MetaDefender Core

Enable dynamic file analysis and behavioral threat detection
directly within your Core environment — no new infrastructure required.

  • Install in Minutes
  • No Extra Integration Needed
  • Uses Your Existing Policies

Unified Zero-Day Detection

Boost Efficacy Rates to 99.9% with one solution

Layer 1: Threat Reputation

Expose Known
Threats Fast

Stop the flood of known threats.

Checks URLs, IPs, & domains in real time ​or offline to detect ​malware, phishing, & botnets.

Blocks reused infrastructure & commodity malware and forces attackers to rotate basic indicators.

Layer 2: Dynamic Analysis

Uncover Unknown
Threats

Detects evasive malware hiding from traditional sandboxes.

An emulation-based sandbox analyzes files to detect ​
hidden threats like ransomware.

Exposes artifacts, loader chains, script logic and evasion tactics.

Layer 3: Threat Scoring

Prioritize Threats

Reduce alert fatigue.

Threat risk levels are ranked to quickly highlight priority threats in real-time.

Layer 4: Threat Hunting

Identify Malware
Campaigns

Machine-Learning Similarity Search

Threat Pattern Correlation matches unknown threats to known malware, tactics, infrastructure and more.

Uncovers malware families and campaigns, forcing attackers to overhaul tactics and infrastructure. 

Get Started in 3 Simple Steps

  • Activate Your Integration

    Add your API key to enable the Adaptive Sandbox with built-In Threat Intelligence.

  • Configure Policies

    Select which file types or risk categories will be automatically sent for dynamic analysis.

  • View Results

    View sandbox verdicts, threat scores, & IOCs directly within your Core dashboard.

  • Step 1
  • Step 2
  • Step 3

Embedded & Remote
Adaptive Sandbox Engine Features

The following table outlines Adaptive Sandbox remote and embedded engine feature set. It doesn’t include platform features, such as the API coverage, configurable ACL (Access Control List), OAuth integration, CEF (Common Event Format) syslog feedback, etc.
Please contact us to book a technical presentation and get a run-through of all platform features and capabilities.

Support Compliance
with Regulatory Requirements

As cyberattacks and the threat actors that carry them out become more sophisticated, governing bodies around the world are
implementing regulations to ensure critical infrastructure is doing what’s necessary to stay secure.

FAQs

It's the embedded sandbox module inside MetaDefender Core-ideal when you want zero-day analysis tightly coupled to your existing Core pipelines (ICAP, kiosks, email, MFT), especially in regulated or air-gapped sites. Choose Aether if you want the full standalone analysis UI and broader TI workflows.

Use Core policy/CDR triggers (macros, scripts, embedded objects, active content) to auto-route just the risky 2-3% for emulation-maintaining throughput without missing stealthy stage-one vectors. This can also be used manually to analyze the behavior of a file.

Independent detection-logic updates (faster coverage), offline certificate validation for air-gapped ops, expanded filetype/installer coverage, and double-Base64 decoding so you keep pace with evasions without full upgrades.

Yes-Linux server (RHEL/Rocky) on-prem, no outbound dependency in offline mode, minimal egress options, and simple REST connection to existing Core. Designed for OT/ICS and classified networks.

Sharper triage (fewer escalations), faster root cause (decoded scripts/unpacked loaders), and ready-to-action IOCs that enrich your SIEM rules and playbooks.

Stay Ahead of Zero-Day Threats

Fill out the form and we’ll be in touch within 1 business day.
Trusted by 1,900+ businesses worldwide.