METADEFENDER
Cloud

AU

Anonymous User

License Details
Threat Prevention
Flexible file processing and with multiple threat detection, lookup and prevention technologies available in three different tiers to meet your service and volume requirements.
Standard
Geared towards personal users and very small startups that do not have a high volume of files to scan.
Professional
Offers a general-purpose license tailored for most small to mid-sized organizations.
Enterprise
Designed for large organizations in search of a robust cybersecurity solution and the highest scan time and availability SLAs.
Key Features
MetaScanâ„¢ Multiscanning
Scan files with multiple AV engines
Deep CDRâ„¢ File Sanitization
Sanitize files to remove sensitive data
Proactive DLPâ„¢ Sensitive Data Detection and Redaction
Detect and redact sensitive data
Archive Extraction
Extract files from archives
File Type Verification
Verify the type of a file
Volume
API Call Limit
1,000 / Daily
1,000 / Daily
1,000 / Daily or 30,000 Monthly
Number of Antivirus Engines
10
15
20+
File Size Limit
Maximum file size that can be processed
140 MB
256 MB
1 GB+
Throttling (req/min)
Maximum requests per minute allowed
75
150
500
Max files in archive
500
10,000
50,000
Archive recursion level
5
25
50
Antivirus Engines
AhnLabAhnLab
AviraAvira
BitDefenderBitDefender
ClamAVClamAV
K7K7
LionicLionic
Quick HealQuick Heal
RocketCyberRocketCyber
TACHYONTACHYON
VaristVarist
CMCCMC
IkarusIkarus
Webroot SMDWebroot SMD
Xvirus Personal GuardXvirus Personal Guard
Zillya!Zillya!
BKAV Pro!BKAV Pro!
ComodoComodo
EmsisoftEmsisoft
FilseclabFilseclab
McAfeeMcAfee
NanoAVNanoAV
Vir.IT eXplorerVir.IT eXplorer
Vir.IT MLVir.IT ML
Service & Support
Service & Support
Low
Medium
High
Availability SLA
99.5%
99.5%
99.9%
Response time SLA
Excluding archive file or recursive file processing that involve multiple file analysis even though single file is submitted for analysis. Dynamic analysis is also excluded. p50: median value of all the requests in the given month. p90: 90 percentile of all the requests in the given month
8 seconds p50
500ms API calls p50
8 seconds p75
500ms API calls p75
8 seconds p90
500ms API calls p90
RTO
24 hour
12 hour
4 hour
Support
24 hour
12 hour
4 hour
Added Security
Private Scanning
Private Processing
End to End Encryption
Encrypt private resources such as sanitized versions of files using customer provided public keys
IP Range Restrictions
mTLS
Customer Provided IDP
Billing & Organization
Billing & Organization
End to End Encryption
End to End Encryption
20% Over Without Fee
50% Over Without Fee
Organizations
Reporting
Notifications/Alerts
Custom Domain
Additional API Tools
Flexible file processing and with multiple threat detection, lookup and prevention technologies available in three different tiers to meet your service and volume requirements.
Cloud Sandbox
Expand the malware detection and analysis capabilities with adaptive threat analysis.
Reputation
Leverage real-time malware data collected by from all around the world.
Threat Intelligence
Perform threat hunting and detect unknown threats.
Key Features
Execute files on multiple operating systems
Automated interpretation of malware behavior
Extract Indicators of Compromise (IOCs) from a wide range of executables, documents, scripts, and URLs
Emulates 90%+ of highly obfuscated state-of-the-art macro malware (VBA), VBS, PowerShell, Jscript, MSHTA, XSL, WSF
Integrates with YARA, MITRE ATT&CK framework and more
Retrieve scan reports using a file hash
Scan IP addresses, URLs, and domains
File metadata lookup
Pattern search (expression search) intelligence data that focuses on exact matches of predefined conditions
Similarity search techniques aim to identify patterns or indicators resemble known threats or Indicators of Compromise (IOCs)
Volume
API Call Limit1,000 /Daily25,000 /Daily1,000 /Daily
FAQ
Why does the commercial package include fewer engines than the demo account?
What happens to files after scanning?
Are Deep CDR requests charged extra?
Are hash lookup requests charged if the hash is not found?
What is the source of your hash database?
How can I get a demo account?
Am I charged extra if I exceed my daily limits?
What certifications does MetaDefender Cloud have?
How am I charged for unarchiving files?
How many hashes do you have?