Advanced Threat Prevention Platform
MetaDefender is a cyber security platform for preventing and detecting cyber security threats on multiple data channels.
MetaDefender protects organizations from cyber security threats in data that originates from a variety of sources, such as web, email, portable media, and endpoints. The MetaDefender philosophy is:
Organizations have difficulty tracking and securing all data transfer channels that expose them to security threats, especially large enterprises with thousands of employees and contractors. Data transfer channels, such as file uploads, portable media devices, and email attachments, all have the potential to carry targeted attacks that can damage an organization’s reputation, financial standing, customer relationships, and for critical infrastructure, sensitive equipment and the facility itself.
Most cyber security solutions rely upon detection as their core protective function. MetaDefender deep content disarm and reconstruction does not rely on detection. It assumes all files could be infected and rebuilds their content using a secure and efficient process. It supports more than 30 file types, and outputs safe and usable files. Deep content disarm and reconstruction (Deep CDR) is extremely effective in preventing targeted attacks, ransomware, and other types of known and unknown malware threats.
MetaDefender multiscanning uses multiple anti-malware engines to provide superior detection rates of known and unknown threats and deliver extremely fast malware outbreak prevention. MetaDefender customers can simultaneously leverage the combined threat prevention capabilities of more than 30 anti-malware engines using both signature heuristic scanning and machine learning capabilities.
All applications contain vulnerabilities of different degrees of severity that threat actors can exploit. Our file-based vulnerability assessment of binaries and installers detects known vulnerabilities within files and application vulnerabilities in software programs before they are installed on endpoint devices, including IoT devices. We support vulnerability detection for over 1 million files and over 20,000 applications.
MetaDefender proactive data loss prevention (Proactive DLP) can help prevent potential data breaches and regulatory compliance violations by detecting and blocking sensitive data in files and emails, including credit card numbers and social security numbers. MetaDefender DLP supports a wide range of file types, including Microsoft Office and PDF.
Customers can implement our industry-leading deep content disarm and reconstruction, multiscanning, and file-base vulnerability assessment technology through either our MetaDefender Cloud service or by deploying MetaDefender software solutions within their own environment, including air-gapped networks.
Deep Content Disarm and Reconstruction (Deep CDR) – Sanitize over 30 common file types, and rebuild each file ensuring maximum usability with safe content.
Multiscanning – Scan with over 30 anti-malware engines using signatures, heuristics, and machine learning technology for the highest and earliest detection of known and unknown threats.
File-based Vulnerability Assessment – Detect known vulnerabilities in more than 20,000 software applications using over 1 billion hashes.
Proactive Data Loss Prevention (Proactive DLP) – Content-check emails and 30+ common file types for PII before they are transferred.
Archive Extraction – Quickly unpack over 30 compressed file types to speed up multiscanning and improve malware detection.
File Type Verification – Detect spoofing of over 4,500 file types and block spoofed files from entering your organization.
Workflow Engine – Customize security policies to process files in the most efficient and secure way for your organization.
For integration with existing security architectures via REST API
For processing files entering secure networks on portable media
For a second layer of defense against advanced email attacks
For detecting and preventing threats in web traffic
For securely transferring and storing files entering networks
For integrating our large hash database, IP reputation services, and more
For inspecting devices before they enter facilities and networks