MetaScanâ„¢ Multiscanning Scan files with multiple AV engines Scan files with multiple AV engines | |||
Deep CDRâ„¢ File Sanitization Sanitize files to remove sensitive data Sanitize files to remove sensitive data | |||
Proactive DLPâ„¢ Sensitive Data Detection and Redaction Detect and redact sensitive data Detect and redact sensitive data | |||
Archive Extraction Extract files from archives Extract files from archives | |||
File Type Verification Verify the type of a file Verify the type of a file |
API Call Limit | 1,000 / Daily | 1,000 / Daily | 1,000 / Daily or 30,000 Monthly |
Number of Antivirus Engines | 10 | 15 | 20+ |
File Size Limit Maximum file size that can be processed Maximum file size that can be processed | 140 MB | 256 MB | 1 GB+ |
Throttling (req/min) Maximum requests per minute allowed Maximum requests per minute allowed | 75 | 150 | 500 |
Max files in archive | 500 | 10,000 | 50,000 |
Archive recursion level | 5 | 25 | 50 |
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() | |||
![]() |
Service & Support | Low | Medium | High |
Availability SLA | 99.5% | 99.5% | 99.9% |
Response time SLA Excluding archive file or recursive file processing that involve multiple file analysis even though single file is submitted for analysis. Dynamic analysis is also excluded. p50: median value of all the requests in the given month. p90: 90 percentile of all the requests in the given month Excluding archive file or recursive file processing that involve multiple file analysis even though single file is submitted for analysis. Dynamic analysis is also excluded. p50: median value of all the requests in the given month. p90: 90 percentile of all the requests in the given month | 8 seconds p50 500ms API calls p50 | 8 seconds p75 500ms API calls p75 | 8 seconds p90 500ms API calls p90 |
RTO | 24 hour | 12 hour | 4 hour |
Support | 24 hour | 12 hour | 4 hour |
Private Scanning | |||
Private Processing | |||
End to End Encryption Encrypt private resources such as sanitized versions of files using customer provided public keys Encrypt private resources such as sanitized versions of files using customer provided public keys | |||
IP Range Restrictions | |||
mTLS | |||
Customer Provided IDP |
Billing & Organization | |||
End to End Encryption End to End Encryption End to End Encryption | 20% Over Without Fee | 50% Over Without Fee | |
Organizations | |||
Reporting | |||
Notifications/Alerts | |||
Custom Domain |
Execute files on multiple operating systems | |||
Automated interpretation of malware behavior | |||
Extract Indicators of Compromise (IOCs) from a wide range of executables, documents, scripts, and URLs | |||
Emulates 90%+ of highly obfuscated state-of-the-art macro malware (VBA), VBS, PowerShell, Jscript, MSHTA, XSL, WSF | |||
Integrates with YARA, MITRE ATT&CK framework and more | |||
Retrieve scan reports using a file hash | |||
Scan IP addresses, URLs, and domains | |||
File metadata lookup | |||
Pattern search (expression search) intelligence data that focuses on exact matches of predefined conditions | |||
Similarity search techniques aim to identify patterns or indicators resemble known threats or Indicators of Compromise (IOCs) |
API Call Limit | 1,000 /Daily | 25,000 /Daily | 1,000 /Daily |