Listing Thumbnail

    MetaDefender Core Windows

     Info
    Sold by: OPSWAT 
    Deployed on AWS
    OPSWAT MetaDefender Core provides comprehensive file upload security to protect against malware, zero-day attacks, and data breaches.
    4.5

    Overview

    Open image

    Note: This is a contract listing for use with a private offer only. This listing is not meant to be transacted outside of an AWS private offer. To inquire about a Private Offer, please contact us at apn-sales@opswat.com .

    OPSWAT MetaDefender Core offers an advanced multi-layer security platform that prevents malicious traffic from infiltrating your AWS Cloud deployment to protect your mission-critical data from deliberate theft or inadvertent leakage and compromise. The solution combines superior malware detection with market-leading threat detection and prevention with multiscanning, broad file-type Deep CDR (Content Disarm and Reconstruction), and vulnerability scanning and reporting of installers, binaries or applications.

    MetaDefender Core offers flexible deployment options via NVME, along with support for containers and Amazon EKS. Integration is available via REST API for custom applications, as well as plug-and-play support for ICAP-enabled network appliances and enterprise storage solutions.

    Highlights

    • Quickly scan all files with top 30+ antivirus engines and detect over 99% of known malware.
    • Recursively sanitize 100+ file types with market-leading Deep CDR technology to remove all potential embedded threats.
    • Reliable, scalable solution to meet the needs of both small customers and large or complex enterprises.

    Details

    Sold by

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Win2022 Microsoft Windows Server 2022

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    MetaDefender Core Windows

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    MD Core Windows
    Annual subscription for MetaDefender Core Windows
    $1,200,000.00

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Usage instructions

    Accessing MetaDefender web-based management console:

    • To access the MetaDefender Core web-based management console for the first time, connect to the IP address of the instance using a browser (e.g. http://localhost:8008 ). You will then be guided through the setup wizard to configure, license and use the product.

    Connecting to MetaDefender Core AMI Instance console:

    • To connect to your MetaDefender Core command-line console, you will need to use RDP. For further information about the standard AWS method of connecting to an instance, see information described here: Connect to your Windows instance - Amazon Elastic Compute Cloud
    • Operation of the product is covered here: https://docs.opswat.com/mdcore/operating .

    Health and Monitoring

    Additional Details

    Support

    Vendor support

    https://my.opswat.com/ 

    To obtain the software and related modules, please sign in or create an account at https://my.opswat.com . A license key will be provided by your OPSWAT Sales representative. Minimum system requirements: https://docs.opswat.com/mdss/installation/user-guide . Operation: https://docs.opswat.com/mdss/operating . Instructions for Kubernetes environment: https://docs.opswat.com/mdss/installation/kubernetes-deployment . Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Security, Storage
    Top
    10
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Multi-Engine Malware Detection
    Scan files using over 30 antivirus engines with detection capability of 99% of known malware
    Content Disarm and Reconstruction
    Recursively sanitize over 100 file types by removing potential embedded threats using advanced Deep CDR technology
    Flexible Deployment Architecture
    Support for NVME deployment, container environments, and Amazon EKS with integration capabilities via REST API
    Network Security Integration
    Compatible with ICAP-enabled network appliances and enterprise storage solutions for comprehensive threat prevention
    File Type Security
    Advanced scanning and sanitization capabilities across multiple file types with comprehensive threat detection mechanisms
    Malware Detection Engines
    Supports multiple virus detection engines including Sophos, CSS Premium, and CSS Secure for comprehensive malware identification
    Scanning Models
    Offers three scanning approaches: event-based real-time scanning, retrospective scanning, and API-based pre-write scanning for flexible malware detection
    File Analysis Techniques
    Utilizes static, dynamic, and forensic analysis powered by SophosLabs Intelix platform for comprehensive file examination without execution
    Multi-Storage Platform Support
    Provides scanning capabilities across Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx storage platforms
    Security Configuration Management
    Enables visibility into storage bucket permission policies and configurations through a unified dashboard with security assessment capabilities
    Threat Detection
    Advanced intrusion detection and prevention system with behavioral analysis and predictive machine learning capabilities
    Container Security
    Native security controls for Docker containers with automated protection and application control mechanisms
    Workload Protection
    Host-based security solution supporting both Windows and Linux environments with comprehensive vulnerability shielding
    Integrity Monitoring
    File and system integrity monitoring with real-time detection of unauthorized changes and configuration drifts
    Multi-Environment Support
    Security platform compatible with physical, virtual, and cloud infrastructure with flexible deployment options

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    28 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    43%
    50%
    4%
    4%
    0%
    0 AWS reviews
    |
    28 external reviews
    External reviews are from G2  and PeerSpot .
    Eido Ben Noun

    Multi‑engine detection has significantly improved secure file transfers and threat prevention

    Reviewed on Jan 21, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I have used MetaDefender  for one and a half years, deploying it in different environments and managing a team of professional services that deploy MetaDefender  products in customer environments. I talk with customers and am aware of use cases where new or additional needs arose after MetaDefender deployment. For example, customers needed to transfer files between source and destination using MetaDefender. I know that MetaDefender File Transfer Protocol, or MFT , is now supported, but in the past, it was not. There are products that have been developed from customer needs, such as products that can transfer files from source to destination with integration to MetaDefender.

    What is most valuable?

    The detection rate of the MetaScan multi-scanning feature is very high. When discussing Linux with five engines or ten engines, it can detect most of the viruses that are tested. I have seen very few instances where customers reported a virus that was not blocked after a PT scan. When we verify these cases, we confirm they occurred. Of course, every engine has its own detection rate, and you cannot achieve 100 percent detection. When using MetaDefender especially on Windows, the detection rate is very high, and it increases as you use more engines. Most customers I see using eight or twelve engines on Windows have good results with both configurations. When customers use a large number of engines, such as twenty engines with integration to external scanners, the results look almost perfect because in cyber security, there is no 100 percent, but it is close to that.

    The effectiveness of Deep CDR in reconstructing files safely and without signatures is very effective. When people configure Deep CDR correctly, it performs as it should. Sometimes some files are negatively affected by CDR. If I must be specific about what could be helpful, it would be to create a policy or workflow in OPSWAT terminology that handles cases when CDR cannot be performed or harms the file. I am not certain if the system can check whether CDR has harmed a file, but I know of use cases where CDR was disabled because it made files unable to open or unable to open properly. I believe this is very effective and is the most effective engine of OPSWAT because customers ask for OPSWAT for two main reasons: the CDR capabilities and the multi-scanning engines.

    What needs improvement?

    Some feedback indicated that it takes too much time to configure certain policies because there are many options. Some people appreciate this because you can configure anything, but I believe MetaDefender should have a wizard or general policies that can be used for 80 percent of customers.

    I use the expanded file type and archive coverage feature sometimes, especially for customers who try to scan large archives with the deep scan capabilities of OPSWAT and Deep CDR. This provides full protection because it scans every single file, but sometimes it takes too long. When discussing CAB files or archives for patching or server updates and BIOS updates and operating system updates, the scanning process takes too long, and it was difficult for customers who sometimes decided not to scan because the scanning time was excessive.

    I use the reporting and audit visibility features. Some capabilities are lacking in reporting because we do not have full statistics that are easy for users to understand. If something requires checking and then referring to documentation to understand it, that is too much for most users. When looking at one of the statistics, you can see how many files have been scanned and then you see a number out of 500 or a different number if you change it. It is not a number of files or scan processes; it is a number of files inside a file. When you scan a PowerPoint presentation file, for example, it counts as forty different files because of all the sub-files. I understand from customers that when they look at the visualization data or statistics, they do not understand what is happening there.

    Most customers I see do not use the file-based vulnerability assessment feature. It has some good results about vulnerabilities, but I am not certain if it is that helpful because many organizations, when they deploy a file and see that there are vulnerabilities, still deploy it because it is part of the code. It can produce results, but those results do not cause any action. Many products have something more advanced than vulnerabilities and static scoring. They have tools that can inform you about a vulnerability, whether the vulnerability is exploitable, if it is weaponized, and if someone can use this vulnerability in your environment. The file-based vulnerability feature works, but for most people, they do not take any action based on the results or block files because of file-based vulnerabilities.

    For how long have I used the solution?

    I have been working in cyber security for almost eight years.

    What do I think about the stability of the solution?

    The stability of the system is very high. I have not experienced crashes or downloads when the server is rebooted, and the server runs well after rebooting. I have not seen errors frequently. I recall one problem with MetaDefender email where there was an unusual issue with some connections remaining open, but I found this kind of problem only once. Most of the time, it is very stable, and you can rely on MetaDefender Core and also email. The stability problems with OPSWAT occurred when they attempted to migrate one product, such as the email product, to a SaaS service; it was not stable in that environment.

    What do I think about the scalability of the solution?

    MetaDefender is very scalable. From what I understand, when you use one database for all instances, you can deploy ten different servers or ten different instances with a separate database for each one. You cannot check the status of scans in each one; you have to check each specific instance. When discussing a shared database, it is scalable, but the performance is harmed. I do not know the specific impact, but it is just a feeling I have.

    How are customer service and support?

    I have contacted the technical support of OPSWAT. The quality of answers from support has been very good most of the time. It can be useful when contacting support to mention what needs to be collected and what needs to be sent before opening the ticket. For example, if discussing an issue, support will probably ask for specific logs. This can save time because many vendors, when they check something and ask for logs, need those logs from the beginning. If you open a ticket and the answer is to proceed, and the answer after one day is that specific logs are needed, it is better to know that from the beginning.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The deployment of MetaDefender on Windows and Linux machines is very easy and quick. When discussing deployment of containers or deployment in Kubernetes  environments, it sometimes takes too long. The deployment of the sandbox product takes too long. The deployment of MetaDefender email security, core, and MetaDefender kiosk has very easy and quick deployment.

    What about the implementation team?

    One person can deploy MetaDefender. It is one of the products that can be managed by one person and managed easily, including the deployment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing of MetaDefender is about hundreds of dollars. If I remember correctly, when someone attempted to buy from us one instance of OPSWAT, it was about nine thousand dollars for multi-scanning with eight engines and also the CDR module. The pricing is good, but when you add additional engines, this is what causes most people not to use additional features. Every additional engine, not about scanning engines but other engines such as file-based vulnerabilities and so forth, requires another license. If customers could buy in one price the basic package, which includes CDR and multi-scanning, in one price, many people would prefer to do it. However, when it is necessary to pay for every single engine or single feature, I believe most customers do not want to use it for that reason.

    Which other solutions did I evaluate?

    I have used alternatives to MetaDefender, but not as an administrator, only as a user. I used some kiosk products similar to MetaDefender kiosk. There is an alternative called Sasa Software, I believe it is Sasa Scanner or Gateway Scanner. I used it, but the user interface is not as good as OPSWAT. The experience with this product is not as good as the experience with OPSWAT, and the time it took to scan some large files was very long. OPSWAT is the best alternative. I also see on customers' side another product called RESEC, and this product also was not a good experience. The user experience is not good enough in this field, and when users try to configure policies, it lacks features when compared to OPSWAT.

    What other advice do I have?

    The sandbox helps in cases of suspicious files. However, the sandbox alert indicates suspicious activity for many different files. When we test some files that we download from vendors' official sites for server BIOS upgrades or firmware upgrades on servers, such as files from Dell or HPE, these files are also considered suspicious for many use cases. The sandbox is good only for specific areas. If discussing email, it can be good. However, if discussing large files, the sandbox can indicate suspicious activity in almost every executable file. This causes customers not to believe in the results. They say it is suspicious, but it is fine to them. Even if something is actually suspicious, it does not receive attention because of the many files that should be legitimate but are considered suspicious.

    Perhaps the effectiveness of the sandbox and level of suspicious files can have two different levels. If asked how it can be better, a different score or different tag for suspicious files from known vendors and suspicious files from unknown vendors could help. Multiple levels of suspicious files, scores, or tags could be something that can be configured. For example, when using the sandbox to scan files that you download from the internet to different environments, such as air gap environments, and in this environment you manage IBM servers, if you scan the file and select that you are using it for IBM servers before scanning, it could be considered less suspicious. The system could also load a certificate of the file that you download and then determine whether it has a trusted certificate or a certificate that is probably good enough or probably not suspicious most of the time.

    I am not certain if MetaDefender can do anything else. Perhaps if they want to improve vulnerability management, instead of managing static CVEs, they could have a different method involving CVEs but something else as well. For example, CVEs that can be harmful because they are exploitable could be differentiated. However, this is something that cannot be managed at the MetaDefender level because it is just about files on a perimeter and does not understand the deployment of the environment because it is not running in the real environment. I am not certain if there is a way to do this better.

    There are some upgrades when MetaDefender has new features, so you have to upgrade. This is not about the upgrade of the engines that happen all the time if you have an internet connection or do it manually. The maintenance can take significant effort that causes most people not to upgrade and update it all the time. Considering offline users, offline environments, and environments with no internet, easier updates could be helpful. The upgrade of MetaDefender version, whether email or MetaDefender Core, is very quick. I would rate this review eight out of ten.

    Brody T.

    Consistent Background Scanning with Easy to Understand Results

    Reviewed on Jan 16, 2026
    Review provided by G2
    What do you like best about the product?
    File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage.
    What do you dislike about the product?
    The main effort is during rollout. Policies need careful adjustment so business files are not blocked unnecessarily. Once tuned, ongoing maintenance is minimal.
    What problems is the product solving and how is that benefiting you?
    It reduces operational risk caused by infected or suspicious files entering the environment. This leads to fewer disruptions, fewer support tickets, and a more stable IT environment overall.
    Nicolas M.

    Fast, Clear Scanning with File Sanitization That Keeps Workflows Moving

    Reviewed on Jan 15, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender protects against file based threats without forcing changes to existing security architecture. Scanning is fast and consistent, and the results are clear enough to automate actions. The option to sanitize files instead of blocking them helps maintain normal business workflows.
    What do you dislike about the product?
    Policy tuning requires attention, especially when dealing with archives or mixed file types. Early testing is important to prevent overly strict rules from interrupting normal traffic.
    What problems is the product solving and how is that benefiting you?
    It reduces exposure to file based threats coming from external users, vendors, and integrations. This lowers incident frequency, improves confidence in inbound content, and strengthens overall security posture without adding operational friction.
    Levi F.

    Reliable, Workflow Friendly Scanning with Easy to Use API

    Reviewed on Jan 15, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender fits well into automated workflows and runs reliably without manual intervention. The API responses are easy to consume in scripts and jobs, and scanning performance stays consistent even when tasks run in parallel.
    What do you dislike about the product?
    Some upfront policy tuning is needed to prevent automated jobs from failing on edge case file types.
    What problems is the product solving and how is that benefiting you?
    It adds automated file security checks without breaking hands-off workflows. This reduces risk from untrusted inputs while keeping automation reliable, predictable, and easy to maintain at scale.
    Parker S.

    MetaDefender Simplifies Consistent, Scalable File Scanning Across Platforms

    Reviewed on Jan 14, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender makes it easier to enforce consistent file scanning across shared platforms. It scales well as usage grows and avoids each application having to build its own file security logic. Policies are flexible enough to support different risk levels while keeping a common security baseline.
    What do you dislike about the product?
    Some upfront planning and tuning are needed to align policies with multiple application teams.
    What problems is the product solving and how is that benefiting you?
    It centralizes file security at the platform layer. This reduces exposure from third party content and helps maintain consistent protection as new services are added.
    View all reviews