Listing Thumbnail

    MetaDefender Endpoint

     Info
    Sold by: OPSWAT 
    Deployed on AWS
    OPSWAT MetaDefender Endpoint ensures secure network access by enforcing endpoint compliance and protecting against unauthorized peripheral media. With real-time visibility and a centralized platform, organizations can manage device access, enforce security policies, and reduce risk. This streamlined approach strengthens cybersecurity while minimizing operational overhead.
    4.5

    Overview

    Play video

    MetaDefender Endpoint delivers secure network access, deep endpoint compliance, and peripheral media protection. It offers comprehensive visibility and control over what devices are accessing your network and advanced peripheral device protection. MetaDefender Endpoint streamlines ongoing management with a single platform approach, reducing time, effort, and, most importantly, risk. This centralized platform empowers organizations to define security policies, manage device access, and ensure compliance, all while maintaining a high level of protection against potential threats.

    **Note: This is a contract listing for use with a Private Offer only and cannot be provisioned without acceptance of a Private Offer. Prices reflected in the Pricing Information section of this listing apply only to Public Offers. Please contact our Sales team for a customized Private Offer quote. Ready to boost your security with MetaDefender Endpoint? Contact our sales team at apn-sales@opswat.com  for a custom Private Offer!

    **Note: Private Offer pricing entitles you to a specified quantity of use for the contract duration.

    Highlights

    • A Unified Multi-Function Platform Approach: Threat detection, vulnerability management, patch management, advanced endpoint protection, compliance, and incident response in one platform.
    • Peripheral Media Protection: Delivers security compliance, visibility, and control with granular policies to every device accessing your network. MetaDefender Endpoint also provides peripheral media protection by scanning files from USBs out-of-bound (using MD Core or MD Cloud) and blocking threats to protect peripheral media data transfer.
    • Enhanced threat detection using multiscanning technology with 30+ antivirus engines and a detection rate of 99,2%.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    MetaDefender Endpoint

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    MetaDefender Endpoint
    MetaDefender Endpoint offers endpoint protection and compliance by utilizing file scanning and sanitization by AV engine. The module includes Advanced Removable Media Protection, which can scan files to prevent malicious content from being introduced via USB usage. MetaDefender Endpoint provides device security score by utilizing features like Device Compliance, Vulnerable Apps, OS updates, App remover, Malware Scanning, and Patch Management. *MetaDefender Cloud or MetaDefender Core scanning license is required.
    $80.00

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Your OPSWAT Sales representative will provide you with a license key. For sales inquiries, please contact OPSWAT at apn-sales@opswat.com .

    Please visit https://www.opswat.com/support/contact-support  to contact OPSWAT support.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.5
    22 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    77%
    18%
    5%
    0%
    0%
    0 AWS reviews
    |
    22 external reviews
    External reviews are from G2  and PeerSpot .
    Brody T.

    Consistent Background Scanning with Easy to Understand Results

    Reviewed on Jan 16, 2026
    Review provided by G2
    What do you like best about the product?
    File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage.
    What do you dislike about the product?
    The main effort is during rollout. Policies need careful adjustment so business files are not blocked unnecessarily. Once tuned, ongoing maintenance is minimal.
    What problems is the product solving and how is that benefiting you?
    It reduces operational risk caused by infected or suspicious files entering the environment. This leads to fewer disruptions, fewer support tickets, and a more stable IT environment overall.
    Nicolas M.

    Fast, Clear Scanning with File Sanitization That Keeps Workflows Moving

    Reviewed on Jan 15, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender protects against file based threats without forcing changes to existing security architecture. Scanning is fast and consistent, and the results are clear enough to automate actions. The option to sanitize files instead of blocking them helps maintain normal business workflows.
    What do you dislike about the product?
    Policy tuning requires attention, especially when dealing with archives or mixed file types. Early testing is important to prevent overly strict rules from interrupting normal traffic.
    What problems is the product solving and how is that benefiting you?
    It reduces exposure to file based threats coming from external users, vendors, and integrations. This lowers incident frequency, improves confidence in inbound content, and strengthens overall security posture without adding operational friction.
    Parker S.

    MetaDefender Simplifies Consistent, Scalable File Scanning Across Platforms

    Reviewed on Jan 14, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender makes it easier to enforce consistent file scanning across shared platforms. It scales well as usage grows and avoids each application having to build its own file security logic. Policies are flexible enough to support different risk levels while keeping a common security baseline.
    What do you dislike about the product?
    Some upfront planning and tuning are needed to align policies with multiple application teams.
    What problems is the product solving and how is that benefiting you?
    It centralizes file security at the platform layer. This reduces exposure from third party content and helps maintain consistent protection as new services are added.
    Emily B.

    Effortless, Reliable File Scanning for Hassle Free Administration

    Reviewed on Jan 13, 2026
    Review provided by G2
    What do you like best about the product?
    It scans files reliably without putting noticeable strain on servers or interrupting user access. Monitoring is straightforward, and day to day operation does not require constant attention, which is important from a systems administration point of view.
    What do you dislike about the product?
    Initial setup and policy tuning take time, especially when defining how strict scanning should be for different file types.
    What problems is the product solving and how is that benefiting you?
    It prevents malicious files from entering servers and shared locations. This reduces remediation work and helps keep systems running smoothly with fewer incidents.
    Daisy H.

    Seamless Integration and Robust Protection for Real World Pipelines

    Reviewed on Jan 09, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender fits well into real application pipelines and does not require heavy redesign. File scanning is fast and reliable, even under load, and the API is easy to automate. The combination of multi-engine detection and file sanitization gives strong protection without forcing users to change how they work. Logs and results are clear enough to connect with SIEM and monitoring tools.
    What do you dislike about the product?
    Policy tuning takes some effort at the start, especially for archives and uncommon file types. Careful testing is needed to avoid blocking safe files.
    What problems is the product solving and how is that benefiting you?
    It protects file upload and sharing points from hidden threats. This lowers incident risk and reduces manual security reviews while keeping systems available and responsive.
    View all reviews