MetaScanâ„¢ Multiscanning | |||
Deep CDRâ„¢ File Sanitization | |||
Proactive DLPâ„¢ Sensitive Data Detection and Redaction | |||
Archive Extraction | |||
File Type Verification |
API Call Limit | 1,000 / Daily | 1,000 / Daily | 1,000 / Daily or 30,000 Monthly |
Number of Antivirus Engines | 10 | 15 | 20+ |
File Size Limit | 140 MB | 256 MB | 1 GB+ |
Throttling (req/min) | 75 | 150 | 500 |
Max files in archive | 500 | 10,000 | 50,000 |
Archive recursion level | 5 | 25 | 50 |
AhnLab | |||
Avira | |||
BitDefender | |||
ClamAV | |||
K7 | |||
Lionic | |||
Quick Heal | |||
RocketCyber | |||
TACHYON | |||
Varist | |||
CMC | |||
Ikarus | |||
Webroot SMD | |||
Xvirus Personal Guard | |||
Zillya! | |||
BKAV Pro! | |||
Comodo | |||
Emsisoft | |||
Filseclab | |||
McAfee | |||
NanoAV | |||
Vir.IT eXplorer | |||
Vir.IT ML |
Service & Support | Low | Medium | High |
Availability SLA | 99.5% | 99.5% | 99.9% |
Response time SLA | 8 seconds p50 500ms API calls p50 | 8 seconds p75 500ms API calls p75 | 8 seconds p90 500ms API calls p90 |
RTO | 24 hour | 12 hour | 4 hour |
Support | 24 hour | 12 hour | 4 hour |
Private Scanning | |||
Private Processing | |||
End to End Encryption | |||
IP Range Restrictions | |||
mTLS | |||
Customer Provided IDP |
Billing & Organization | |||
Usage Buffer | 20% Over Without Fee | 50% Over Without Fee | |
Organizations | |||
Reporting | |||
Notifications/Alerts | |||
Custom Domain |
Execute files on multiple operating systems | |||
Automated interpretation of malware behavior | |||
Extract Indicators of Compromise (IOCs) from a wide range of executables, documents, scripts, and URLs | |||
Emulates 90%+ of highly obfuscated state-of-the-art macro malware (VBA), VBS, PowerShell, Jscript, MSHTA, XSL, WSF | |||
Integrates with YARA, MITRE ATT&CK framework and more | |||
Retrieve scan reports using a file hash | |||
Scan IP addresses, URLs, and domains | |||
File metadata lookup | |||
Pattern search (expression search) intelligence data that focuses on exact matches of predefined conditions | |||
Similarity search techniques aim to identify patterns or indicators resemble known threats or Indicators of Compromise (IOCs) |
| API Call Limit | 1,000 /Daily | 25,000 /Daily | 1,000 /Daily |