AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Relationships

Amazon Web Services + OPSWAT

Protecting Your Cloud Infrastructure

OPSWAT protects your cloud applications and storage in AWS environments with advanced, scalable, and multi-layered threat prevention technologies.

Overview

Under the AWS shared responsibility model, AWS customers are responsible for securing their content as well as their platforms, applications, systems, and networks that are deployed on the cloud. This is similar to the protections that organizations need to incorporate for their on-premises systems. 

Building on the advanced technology collaboration with AWS, OPSWAT provides an advanced multi-layered security platform that better prevents known and unknown malware from infiltrating your AWS cloud deployment and protects your mission-critical data from deliberate theft or inadvertent leakage.

MetaDefender on AWS Can Help You

  • Prevent malicious file uploads to web applications deployed in AWS environment.
  • Prevent data breaches, downtime, and compliance violations in your cloud storage.
  • Avoid data transfer costs or privacy concerns as deployment and analysis are in your own environment with no data shared outside of it.
  • Identify vulnerabilities for all running services and applications deployed on AWS.
  • Deploy on Amazon Elastic Compute Cloud (EC2) with the pre-installed MetaDefender AMI (Amazon Machine Image).
  • Implement high-performance file processing in milliseconds, with load balancing available for high traffic deployments.

MetaDefender Features and Benefits

Deep CDR 

Prevent Zero-Day Attacks and Evasive Malware 

Removes embedded macros, objects, and other out-of-policy content from over 180 file types and regenerates safe and usable files. Deep CDR is extremely effective at preventing targeted attacks, emerging threats, ransomware, known threats, and unknown malware.

MetaScan Multiscanning 

Maximum Malware Detection & Prevention 

Leverages multiple anti-malware engines to achieve fast, accurate threat detection. It combines the advanced threat prevention capabilities of more than 30 anti-malware engines. Utilizing signature and heuristic scanning, machine learning capabilities, and global threat intelligence feeds to increase response capabilities and accuracy.

Proactive DLP

Prevent Data Breaches and Regulatory Compliance Violations

Prevents potential data breaches and aids regulatory compliance by detecting and blocking sensitive data in files. Supports multiple file types, including Microsoft Office and PDF. AI-powered Document Classification detects adult content in images and offensive language in text.

File-Based Vulnerability Assessment

Detect Vulnerable Software Before Installation

Scans and analyzes binaries and installers uploaded through your website to detect known application vulnerabilities before they are installed or deployed.

File Type Verifications

Minimize the Risk of File Type Spoofing

Accurately identifies thousands of file types by analyzing file content—not just the extension—to prevent spoofed file attacks.

Adaptive Sandbox

Adaptive Threat Analysis

Dynamic malware analysis tool that enables users to analyze files without affecting the application, system, or platform on which they run. 

MetaDefender on AWS Use Cases 

  • Secure Your Enterprise Data Storage

    MetaDefender Storage Security protects your Amazon EFS and Amazon S3 buckets against both known and unknown threats using advanced threat prevention technologies.

  • Protect Web Applications Deployed on AWS 

    MetaDefender Core and MetaDefender ICAP Server can be deployed via an AMI (Amazon Machine Image) to prevent malicious traffic from infiltrating your AWS Cloud deployment and protect your mission-critical data from deliberate theft, inadvertent leakage, and compromise.

    MetaDefender ICAP Server also offers flexible deployment options via AMI, along with support for containers and Amazon EKS.

“With OPSWAT Deep CDR, Upwork is able to prevent 100% of zero-day file attacks, compared to only 70% blocked by standard AV. All files with active objects are sanitized. 75% of files are processed and ready in less than a second and 99% in less than six seconds.”

Head of Security
Upwork

Customer Stories

Recommended Resources

  • Resources

    AWS Deployment

    This Deployment Guide provides step-by-step instructions for deploying MetaDefender on Amazon Web Services infrastructure…

  • Resources

    MetaDefender Core Developer Guide

    This is the API documentation for MetaDefender Core Public API. If you would like to evaluate or have any questions about this documentation, please contact us via our Contact Us form...
  • Resources

    MetaDefender Cloud Formation

    CloudFormation Templates to generate all resources needed to run the MetaDefender AMI...
  • Resources

    Compliance and Certifications

    OPSWAT has achieved ISO/IEC 27001:2013 certification. An independent examination of the OPSWAT Information Security Management System (ISMS) and OPSWAT MetaDefender and MetaDefender Access services by...
  • Webinar

    Best Practices for Securing Your Data in Amazon S3

    Amazon Simple Storage Service (Amazon S3) is the world's most popular cloud object storage solution with a comprehensive set of configurations for security and compliance requirements...

  • Webinar

    File Upload Protection: A Critical Gap in Web App Security

    Digital transformation is a must for today’s organizations, resulting in a migration from paper-based to digital documents. Millions of documents are now being shared among collaborators weekly and...
  • Webinar

    Secure Enterprise Data Storage from Malware Attacks and Mitigate Compliance Risk

    Adoption of storage solutions like OneDrive, Box, and Amazon S3 is growing at a rapid pace. These services facilitate access, sharing and collaboration for a global distributed workforce and ensure...

  • White Paper

    Content Disarm and Reconstruction (CDR) Technology Guide

    This guide provides an overview of emerging cybersecurity threats, how they can bypass existing malware prevention technologies, the impact they can have on organizations, and how you can protect...

  • White Paper

    How to Block Malicious File Uploads with OPSWAT APIs

    Although file uploads are essential for productivity and many web applications, they also offer an attack vector to cyber criminals. Restricting file types and scanning files with a single...
  • Datasheet

    MetaDefender Core Datasheet

  • Datasheet

    MetaDefender Storage Security Datasheet

  • Datasheet

    File Upload Security Datasheet

Contact Us

OPSWAT partners with world-leading technology companies to secure entire data workflows and provide faster, more reliable deployments. Joint customers benefit from a certified integration that secures full interoperability for entire product suites.