Overview
MetaDefender Cloud Prevention API provides enterprise-grade protection against malware, ransomware, and malicious file content for your applications. Multi-scanning with 30+ commercial antivirus engines delivers up to 40% better detection rates than single-engine solutions. At the same time, award-winning Content Disarm and Reconstruction (CDR) removes threats before they reach your users or infrastructure.
Industry-Leading Zero-Day Protection: Our Deep CDR technology achieved a perfect 100% protection and accuracy score from SE Labs, the only solution to earn this recognition. This "trust no file" approach deconstructs every file and rebuilds it with only safe components, preserving usability while eliminating hidden threats that traditional scanning misses.
Developer-Friendly Integration: Integrate MetaDefender Cloud via a RESTful API for real-time scanning and sanitization of uploaded files, without slowing workflows. Comprehensive documentation and sample code enable rapid deployment across a wide range of file types and sizes, delivering scalable and reliable protection for both SMBs and large enterprises.
Enterprise-Proven Scale: Process millions of files daily with 99.9% uptime SLA. Enterprises of all sizes, including Fortune 500 companies, trust MetaDefender Cloud to secure critical operations. OPSWAT customer EPAM Systems strengthened remote access and file security for 70,000+ devices, while FastTrack Software prevented malicious file uploads, ensuring safe and compliant software distribution.
Note: This is a contract listing for use with a Private Offer only and cannot be provisioned without acceptance of a Private Offer. Prices reflected in the Pricing Information section of this listing apply only to Public Offers. Please contact our Sales team to get a customized quote for a Private Offer. To inquire about a Private Offer, please contact us at apn-sales@opswat.com
Note: Private offer pricing is based on a per-tier, per # of API calls basis.
Highlights
- Multi-Scanning and CDR: Detect and remove malware in real time with 30+ commercial anti-virus engines and Content Disarm and Reconstruction (CDR). Proactively stop advanced threats before they reach users or infrastructure.
- Seamless RESTful API Integration: Easily integrate scalable file scanning into applications on AWS. Support for a wide range of file types and sizes ensures reliable protection without slowing workflows.
- Enterprise-Proven Security: Trusted by global enterprises to secure file uploads, protect sensitive data, enforce compliance, and maintain operational resilience across AWS deployments.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Security credentials achieved
(1)

Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
MD Cloud Prevention API - Enterprise | MetaDefender Cloud Prevention API - Enterprise. 30,000 requests/month. Annual subscription. CDR and AV multiscanning are tracked as separate API requests (using both technologies on the same file will consume 2 API requests from the allowance). | $55,000.00 |
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
A license key will be provided by your OPSWAT Sales representative. To obtain the software and related modules, or to receive support, please sign in or create an account at https://my.opswat.com . For sales inquiries, please contact OPSWAT at apn-sales@opswat.com . Visit https://www.opswat.com/support/contact-support for more contact options.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Content policies have protected cloud file uploads and provide clear visibility into blocked data
What is our primary use case?
I have been working with MetaDefender for the past year. I am a customer of MetaDefender . I use MetaDefender for CDR in an Azure Blob environment. The features of MetaDefender that I have found the most valuable include the option to connect to the storage account and create a connection between different blobs and containers, as well as creating a CDR policy and workflow that works for us.
What is most valuable?
I am using the Expanded File Type and Archive Coverage feature. I am using the Enhanced Reporting and Audit Visibility features. The Enhanced Reporting and Audit Visibility features help us to understand what exact type of files are uploaded to the blob and which type of files are blocked or get scanned. We can understand exactly where we might miss the business logical flow and correct it.
The impact of MetaDefender on my organization's scanning process is great because I have the option to harden the platform. If the developers make mistakes in the application development cycle and miss hardening the types of files or the archive levels on the application layer, with MetaDefender, I can restrict it on my end and be sure that no other files are accepted except those that I permit. It will not even be considered to be scanned.
What needs improvement?
MetaDefender could be improved in the future regarding the notification issue. OPSWAT delivers an API structure that you can query via APIs for a lot of data from OPSWAT. However, many customers, including us, are looking for more responsive notifications. If OPSWAT sees that the file uploaded has failed because it doesn't fit the policy or the file types, we would like to get a notification about it rather than developing something on our own that would query OPSWAT for the data.
What do I think about the stability of the solution?
The stability and reliability of MetaDefender are good. I have not yet tested it for disaster recovery. I am planning to do so to understand how it really works in different recovery solutions, such as a cluster or an active-active solution. Therefore, I cannot tell you about this because I have not tested it yet.
What do I think about the scalability of the solution?
When considering the scalability of MetaDefender, I cannot really size it because when you are planning a CDR solution in your company, you should understand where you could have a bottleneck of the files or the hardware. Is it possible to upload a lot of files and still have OPSWAT scan them all, or would they be queued and how much time would it take? You need to plan it. You need to do some sizing before installation and understand exactly what you are seeking from the solution and how it fits your organization.
How are customer service and support?
I do not often communicate with the technical support of MetaDefender, only with the integration team. I am happy with my interaction and communication with MetaDefender's team. The communication was great and understanding. It was easy because I was familiar with OPSWAT Core, not so much with MetaDefender, but with OPSWAT Core I was familiar, and the policy and everything else that you configure on OPSWAT Core. The communication was great.
Which solution did I use previously and why did I switch?
Before MetaDefender, we were using Sasa, which is a platform for CDR, but we use Sasa not exactly for the same business logic. We use Sasa on a different path inside the company, and OPSWAT is really convenient for use via APIs and connecting with storage accounts and other resources that we can upload files from.
How was the initial setup?
I participated in the initial setup and deployment of MetaDefender. The initial setup process was pretty easy. There were a few problems with the SSO configuration, but everything else was pretty straightforward. To integrate the platform and install it very fast and in a good manner, you should plan it very well and understand exactly what your environment is in the company. Whether you are going to install it on-premise or in the cloud environment as a VM or any other solution that they are suggesting. I did not see any problems except the SSO configuration. Everything else was pretty fast and convenient.
What's my experience with pricing, setup cost, and licensing?
I am not much aware of the pricing and licensing of MetaDefender. I know that the SaaS platform is very expensive, and we did it on the IaaS platform in Azure . So I am not very familiar, but because it is IaaS , most of the money goes for the VM and the infrastructure in Azure, and of course the license for the CDR engines. I am not very familiar with the prices.
Which other solutions did I evaluate?
Before choosing MetaDefender, I evaluated other options and other vendors for these use cases, and there are not many vendors doing a great CDR. I know only two that really do the job. We chose MetaDefender because it gives us the option to do more with the CDR, and of course, because of the APIs and the storage accounts because this is the environment that we looked for. We looked for a solution for a specific cloud environment, so MetaDefender was a better solution.
What other advice do I have?
From the beginning, I worked with OPSWAT MetaDefender for other customers at my other job a few years ago. From the last year that we integrated OPSWAT in our company, I have not seen any improvements. It is still okay. It still does the job and makes a good assurance that the files that are coming are really whitelisted and content disarmed. It has not become worse, but it has not become better either. The percentage of accuracy is great. I do not miss anything, but I have not felt any improvement. The effectiveness of MetaDefender in blocking or sanitizing content based on policy is effective. I did not see any problems with the sanitation or something that should be blocked in the test. I did not have such issues.
Before deployment, when looking for a safe path to upload files, you will definitely look for CDR solutions because it depends on the workflow that you are trying to achieve. If there are customers at the end that will upload the files, or some internal business logic that your partners inside the company will upload the files, it depends on what you are trying to achieve. If the files are coming from outside the company, of course, CDR will be the best solution because you would want to restrict the type of files, even the size of the files, and be very restrictive on that end because those files are from the outside, and this path is published outside and is external. When you are looking from the inside, when you are working with partners inside the company, such as different departments, you will not always use the CDR solution. The integration of multi-scanning and Content Disarm and Reconstruction affects my data security operations effectively. If you are trying to disable any active links or anything that could be malicious, OPSWAT did that. It blocks the file types that we are not willing to have inside the company or are not approved. Therefore, it helped us. My impression of the detection rates provided by MetaScan Multi-scanning is great. I have not seen a lot of malicious content on those files that we are scanning, but in the test, I had a pretty high assurance that MetaDefender would find the content that is not welcome at our application end. It is quite easy to research and understand what exactly happened.
I describe the effectiveness of Deep CDR in reconstructing files safely and without signatures as very effective. That is why we chose a CDR platform for those specific workflows that our business wants to accomplish, and not any sandbox or EDR solution that will block the files because they are malicious or suspicious. The CDR still gives us the option to retrieve the file but without any malicious content inside. I do not think I am using Adaptive Sandbox analysis. My overall rating for this solution is eight out of ten.
Advanced threat controls have secured endpoints and simplified safe device access to the network
What is our primary use case?
The use cases for MetaDefender involve checking an endpoint, such as a laptop or USB, to ensure that they are safe, clean, and meet security policy before they connect to the network. I can use it for malware and unknown devices' security status.
What is most valuable?
The best feature of MetaDefender is that it can isolate USB devices from the connected network, blocks malware and unsafe files, and ensures all endpoints follow security policy, so that my organization remains safe and reduces the risk of these threats.
I find MetaDefender effective when it comes to blocking or sanitizing content based on the policies in place because it removes hidden threats and scans devices and endpoints, protecting the environment against unknown and advanced attacks.
The integration of Multi-Scanning and Content Disarm and Reconstruction affects my data security operations positively as it is easy to integrate into my environment.
I find the multi-scanning mechanism and content disarm and reconstruction features beneficial for data security, as MetaDefender's endpoint creates a secure layer to protect my organization from threats and attacks.
The main benefits that MetaDefender brings include isolating USB devices from attacks, removing hidden threats such as malware and malicious attacks, and protecting against unknown and advanced attacks.
My impression of the detection rates provided by MetaScan Multi-Scanning is that they are good, as the scanning of MetaDefender removes hidden threats, detects known issues, and protects devices from unknown malware and attacks.
I assess the effectiveness of Deep CDR in reconstructing files safely without signatures. CDR used in MetaDefender effectively removes dangerous and unsafe attacks by taking a file, removing risky parts, and delivering a clean version to the user, as it removes scripts, hidden links, and malicious components.
I use Adaptive Sandbox Analysis and a sandbox to detect advanced threats, as it receives files, runs them in a VM environment, and discovers the behavior of these files, allowing safe files to return while blocking any that behave poorly.
I find that the features of MetaDefender are strong, and its work is effective for scanning and securing the environment from malware and operates well.
What needs improvement?
I am not using the expanded file type and archive coverage feature because I was unaware of it.
I am not using the enhanced reporting and audit visibility features, and I am unsure about them.
Regarding the reporting, analytics, and audit visibility, I cannot provide a comprehensive answer. I do not know if the audit requirements help me with deep enhanced reporting and audit visibility in MetaDefender.
I have not noticed any improvements in workflow automation with recent enhancements to policy orchestration and engine parallelization.
What I would like to see improved in MetaDefender includes reducing the high cost of the license, as the pricing is very high.
Functionality-wise, I find installation and setup very difficult, and I needed support to help me understand the setup of MetaDefender. The process requires good planning and understanding of the environment to configure it, as the integration with policies takes more time to build and requires more experience.
For how long have I used the solution?
I have been using MetaDefender for one year.
What do I think about the stability of the solution?
When it comes to stability, I find it stable as it maintains good external stability with good availability and no major issues. The setup is difficult, but generally, the product stability is good.
What do I think about the scalability of the solution?
I find it scalable, as more users can work smoothly without any crashing or slowing down.
How are customer service and support?
I evaluate customer service and technical support as good, as they respond in a timely manner.
Which solution did I use previously and why did I switch?
Before MetaDefender, I used EDR, which is the product that I used before switching to MetaDefender.
How was the initial setup?
The deployment process was difficult; I needed a vendor to help me because the setup of MetaDefender is complex.
What about the implementation team?
SIS helped me to deploy MetaDefender.
What was our ROI?
I believe it is worth the money, as it brings time-saving, cost-saving, and efficiency improvements, especially in large environments. However, in smaller environments, it incurs high costs. Overall, it is good because it has many features for scanning and cleaning the environment from malware and saves time.
What's my experience with pricing, setup cost, and licensing?
I do not find it cost-effective, as the costing is high.
Which other solutions did I evaluate?
I decided to switch to MetaDefender because Kaspersky could only detect malware but not take action, whereas MetaDefender detects and prevents threats simultaneously.
I chose MetaDefender because it is capable of adding multi-layered security that prevents threat detection and removes unknown threats, working without signature-based detection, which is beneficial.
What other advice do I have?
I recommend MetaDefender to others because it is effective, has high stability, and is beneficial for environments. I have rated this review a ten out of ten.
Advanced file sanitization has reduced email threats and saves SOC teams significant analysis time
What is our primary use case?
My main use case for MetaDefender is for our client's environment, which is using MetaDefender for their OT security or for their email side. All clients use MetaDefender, and it is especially great for Content Disarm and Reconstruction, which they want to leverage.
For example, one of our clients is using MetaDefender for their email gateway site as their mail gateways, scanning emails. Generally, they use MetaDefender's Content Disarm and Reconstruction property for that email scanning.
None of my customers are using the reporting and audit visibility features on MetaDefender platform.
Integrating multi-scanning and Content Disarm and Reconstruction positively affects my clients' data security operations, prioritizing security over potential delays experienced by end users.
What is most valuable?
The best features MetaDefender offers include its Content Disarm and Reconstruction, which is a key feature chosen by our clients because many other products claim to provide that functionality, but generally, they cannot do it as cleanly. Through Proof of Concept sessions with our clients and the OPSWAT team, they see that MetaDefender's Content Disarm and Reconstruction is strong, usable, and valuable for our customers, making them want to work with OPSWAT specifically for this feature.
For example, one of our customers was not using any Content Disarm and Reconstruction technology but was receiving emails containing PDF documents or XLSX documents, some with malicious content. MetaDefender's technology worked effectively, disarming and reconstructing PDFs to deliver clean copies to their users, while allowing their analysts to see the malicious code.
MetaDefender has positively impacted my clients' organizations by saving time for their SOC teams who were previously receiving false positives and unnecessary alarms from other products, allowing them to focus on analyzing real threats, which has led to fewer incidents.
For one of my clients, a major bank in Turkey, they reported saving approximately 30 percent of their SOC time on analyzing emails since implementing MetaDefender.
MetaScan multi-scanning feature is excellent because it provides multiple vendors for scanning. If one vendor fails, the others remain operational, ensuring continued protection.
Assessing the effectiveness of Deep Content Disarm and Reconstruction in reconstructing files safely and without signatures reveals it to be effective, as clients receive identical documents without changes other than the removal of malicious code.
MetaDefender's file-based vulnerability assessment analyzes binaries and installers for known vulnerabilities before they enter a network, providing a proactive defense that is highly valuable for our customers.
What needs improvement?
While MetaDefender's mail gateway already gives fewer false positives, there is still room for improvement in reducing those even further.
Additionally, MetaDefender could benefit from a better graphical user interface for administrators, making it more usable, although this is not an urgent need but an area for potential improvement.
For how long have I used the solution?
I have been using MetaDefender for three years.
Which solution did I use previously and why did I switch?
It was a fresh sell to our customers for MetaDefender, and I evaluated other options before choosing MetaDefender.
What was our ROI?
I have not seen a direct return on investment, but clients have noted that the product saves time and may reduce the need for fewer employees since the SOC team focuses on critical incidents as MetaDefender handles current analyses efficiently.
What's my experience with pricing, setup cost, and licensing?
Pricing, setup costs, and licensing are handled by my sales team, but feedback indicates that our pricing is better than other vendor solutions.
Which other solutions did I evaluate?
I can specify that my clients considered other options before choosing MetaDefender.
What other advice do I have?
I do not have anything else to add about how my clients use MetaDefender. My review rating for MetaDefender is ten out of ten.
File sanitization has blocked phishing payloads and now reduces manual incident analysis
What is our primary use case?
MetaDefender is used in one of our client environments where every file upload to their web portal goes through the scanning process. It scans using multiple engines and applies CDR before allowing the file into the system. This has helped us stop suspicious documents even before users interface with them.
With the increase in phishing and document-based attacks recently, this kind of file sanitization layer has become very important for us.
What is most valuable?
MetaDefender offers some of the best features such as multiple engine malware scanning, content disarm and reconstruction (CDR), deep file inspection, and strong API-based integrations. Deep file inspection is the feature I find myself using the most, as it helps in my workflow significantly. The multi-engine approach gives more confidence compared to relying on a single antivirus engine, especially for zero-day threats.
MetaDefender's effectiveness in blocking or sanitizing content based on policy is very strong. A combination of multi-engine scanning and CDR makes a big difference. It does not just rely on a signature; it enforces policy at the file level. Policies like blocking files with high-risk indicators, sanitizing documents with embedded macros, and allowing only clean files into the environment show its strengths. MetaDefender is very effective in sanitizing files without breaking usability. The integration of multi-scanning and Content Disarm and Reconstruction affects our data security operations. MetaDefender plays a very important role in today's threat landscape, which heavily uses documents and file-based payloads.
What needs improvement?
The UI can be more user-friendly, and initial steps and policy tuning take some time. Reporting can be improved as extracting detailed insights for management reports takes extra effort.
For how long have I used the solution?
I have been using MetaDefender for 1.5 to 2 years.
What do I think about the stability of the solution?
MetaDefender is stable. We have not faced major downtime.
What do I think about the scalability of the solution?
MetaDefender's scalability is excellent, as it handles larger volumes of file scanning without major issues.
How are customer service and support?
Support for MetaDefender is very responsive, though sometimes complex issues take time to resolve.
Which solution did I use previously and why did I switch?
We evaluated sandbox-based solutions and some email security tools, but MetaDefender's CDR approach was more practical.
What was our ROI?
MetaDefender has positively impacted my organization by reducing the risk of file-based attacks, which has significantly improved our overall defense against phishing and malware delivery techniques. We have seen around a 40% drop in malicious file incidents, and our SOC team is spending less time on manual file analysis now.
What other advice do I have?
MetaDefender is a very time-saving and effort-saving tool. I advise others looking into using MetaDefender to understand their file flow properly before deployment. If integrated correctly, it becomes a very strong layer against modern file-based attacks.
Threats in a file are cleaned before they reach the core, creating a silent shield in place. The SOC workload has reduced because fewer suspicious files reach analysis, and users do not complain much since files still open normally after sanitization. I would rate this review an 8.
Multi-engine threat analysis has boosted protection and now detects and sanitizes files effectively
What is our primary use case?
Our use case is for threat protection.
What is most valuable?
I appreciate the unique features of MetaDefender since it uses multiple scanning in a single engine. The scanning capability, which combines different antivirus and scanning engines integrated into a single engine by OPSWAT, is particularly valuable.
The integration of multi-scanning and Content Disarm and Reconstruction is truly helpful because we can utilize it in other products such as email integration with ICAP capability, and we are also using it in web scanning. The integration is flexible and perfect for our needs.
What needs improvement?
We are not yet using the expanded file type and archive coverage feature.
Enhanced reporting and audit capabilities are not fully utilized. We use only the simple reporting features, such as viewing viruses that were scanned and found, and how they were removed and disinfected.
At this time, I cannot determine specific areas where MetaDefender should improve because it is already nearly perfect.
For how long have I used the solution?
We have been using this solution for two years.
What do I think about the stability of the solution?
I can rate the stability at 10.
What do I think about the scalability of the solution?
One hundred users use the solution.
How are customer service and support?
The technical support can be rated at 9.5 from one to 10, with 10 being the best.
Which other solutions did I evaluate?
Comparing MetaDefender with other antivirus vendors, it is not comparable because of the unique features of using multiple scanning, which I cannot see in other products.
What other advice do I have?
The engine requires constant updates for analysis purposes, which is why we need to maintain it regularly.
The detection rate of MetaDefender is 99.99 percent. It is truly effective because although we are not relying on signatures for scanning, we rely on the behavior of threats, and they are perfectly removed or we are perfectly protected from that scanning. Even though it is not signature-based and scans based on threat behavior, that approach is effective.
We are using adaptive sandbox analysis. Using sandbox analysis helps describe the impact on analyzing any suspicious files and extends the capabilities for how to disinfect or detect threats. It helps us detect zero-day attack threats, so we are protected from that.
The effectiveness of the solution in blocking or sanitizing any content based on our policies is excellent.
I would recommend this product to other users. It should be integrated with AI for enhancement. I would rate this review at 10.