MetaDefender ICAP Server

Advanced Threat Prevention for Network Traffic and Storage Devices

MetaDefender ICAP Server uses the Internet Content Adaptation Protocol (ICAP) to integrate with network appliances to protect against advanced threats in network traffic and storage devices, using industry-leading multi-scanning, vulnerability scanning, and data sanitization, also known as content disarm & reconstruction (CDR) technology.

Benefits

Protect Reverse Proxies

Enhance security by integrating MetaDefender ICAP Server with reverse proxies such as load balancers, web application firewalls and application delivery controllers. Using ICAP, all web applications sitting behind the network appliance are protected. Read more about how to use MetaDefender with F5® BIG-IP® Load Traffic Manager™ (LTM®).

Protect Forward Proxies

MetaDefender ICAP Server prevents the entry of document-based malware and exploits coming from the web in forward proxy mode, as well as providing visibility into the vulnerability levels of installers and executable software applications your users are downloading. Read more about how to use MetaDefender with Blue Coat® Proxy SG and Squid Proxy.

Protect Data on Storage Devices

Protect critical data on storage devices by integrating MetaDefender’s advanced threat detection and prevention of known and unknown threats.

Enhance Security Appliances

Add MetaDefender’s advanced threat protection to Intrusion Prevention Systems and Next Generation Firewalls that support ICAP, such as Check Point, Cisco and others. Read more about how to use MetaDefender ICAP Server with Fortinet FortiGate Firewall.

We've used OPSWAT technology for several years, in multiple integrations and in various products, [and] their reputation in the industry has just been stellar over [that] time. I've worked in the industry for 30 years, and OPSWAT [is] a company I've always trusted and worked well with.

Joe Peck
Senior Director of Product Management, F5®

Features

Data Sanitization (CDR)
Sanitize over 30 common file types, and rebuild each file ensuring full usability with safe content.
Multi-Scanning
Leverage 30+ anti-malware engines using signatures, heuristics, and machine learning technology for the highest and earliest detection of known and unknown threats.
Vulnerability Scanning
Detect vulnerabilities in more than 20,000 software applications using over 1 billion hashes.
High Performance
Scalable for any traffic volume with built-in high-performance architecture.
Customizable Policies
Configure security rules based on host, client or any HTTP header.
Role Based Configuration
Active Directory and LDAP group-based administrative roles.