+
+

Related Products

  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • NinjaOne
    4,254 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,051 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • Iru
    1,487 Ratings
    Visit Website

About

MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.

About

odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise organizations looking for a solution to manage their data protection

Audience

Enterprise organizations that need a powerful malware prevention and content disarm and reconstruction (CDR) solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$0
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

OPSWAT
Founded: 2002
United States
www.opswat.com

Company Information

odix
Founded: 2009
United States
www.odi-x.com

Alternatives

FileWall

FileWall

Odix

Alternatives

FileWall

FileWall

Odix
Falcon Sandbox

Falcon Sandbox

CrowdStrike

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Active Directory
Admin By Request
Blink
F5 BIG-IP SSL Orchestrator
MetaAccess
MetaDefender Kiosk
MetaDefender OT Security
MetaDefender Vault
PwC Amplifier
SURF Security
SafeConnect NAC
Security Score

Integrations

Active Directory
Admin By Request
Blink
F5 BIG-IP SSL Orchestrator
MetaAccess
MetaDefender Kiosk
MetaDefender OT Security
MetaDefender Vault
PwC Amplifier
SURF Security
SafeConnect NAC
Security Score
Claim OPSWAT MetaDefender and update features and information
Claim OPSWAT MetaDefender and update features and information
Claim odix and update features and information
Claim odix and update features and information