Listing Thumbnail

    MetaDefender ICAP Cloud

     Info
    Sold by: OPSWAT 
    Deployed on AWS
    OPSWAT MetaDefender ICAP Cloud provides comprehensive file upload security to protect against malware, zero-day attacks, and data breaches.
    4.5

    Overview

    Play video

    Stop Malware Before It Reaches Your Network

    MetaDefender ICAP Cloud is an advanced cloud-native threat prevention solution that integrates with ICAP-enabled security devices to prevent malware infiltration, data leaks, and zero-day threats. Organizations using NGINX, F5, MFT, or other network security devices can quickly use OPSWAT's multi-layer security platform to inspect and sanitize traffic before threats enter their AWS environment.

    With industry-leading multiscanning, Deep CDR, and vulnerability assessments, MetaDefender ICAP Cloud eliminates file-based threats before they cause harm, keeping your AWS workloads secure without disrupting performance.

    MetaDefender ICAP Cloud is part of OPSWAT's MetaDefender Cloud platform. Designed for effortless integration with ICAP-enabled devices, MetaDefender ICAP Cloud provides your organization with a flexible approach to network, data, and application security, offering a scalable alternative to on-premises infrastructure and lowering overall operational costs.

    **Note: This is a contract listing for use with a Private Offer only and cannot be provisioned without acceptance of a Private Offer. Prices reflected in the Pricing Information section of this listing apply only to Public Offers. Please contact our Sales team for a customized Private Offer quote. Ready to boost your network security with MetaDefender ICAP Cloud? Contact our sales team at apn-sales@opswat.com  for a custom Private Offer!

    **Note: Private offer pricing is based on a per-tier, per # of API calls basis.

    Highlights

    • Quickly scan all files with the top 20+ antivirus engines to detect over 99% of known malware.
    • Recursively sanitize 100+ file types with market-leading Deep CDR technology to remove all potential embedded threats.
    • Easily integrate with any ICAP-enabled network device to scan files before they enter the environment.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    MetaDefender ICAP Cloud

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    MetaDefender ICAP Cloud
    Annual subscription for MetaDefender ICAP Cloud.
    $1,200,000.00

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Your OPSWAT Sales representative will provide you with a license key. To obtain the software and related modules or to receive support, please sign in or create an account at https://my.opswat.com . For sales inquiries, please contact OPSWAT at apn-sales@opswat.com .

    Please visit https://www.opswat.com/support/contact-support  to contact OPSWAT support.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.5
    28 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    43%
    50%
    4%
    4%
    0%
    0 AWS reviews
    |
    28 external reviews
    External reviews are from G2  and PeerSpot .
    Eido Ben Noun

    Multi‑engine detection has significantly improved secure file transfers and threat prevention

    Reviewed on Jan 21, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I have used MetaDefender  for one and a half years, deploying it in different environments and managing a team of professional services that deploy MetaDefender  products in customer environments. I talk with customers and am aware of use cases where new or additional needs arose after MetaDefender deployment. For example, customers needed to transfer files between source and destination using MetaDefender. I know that MetaDefender File Transfer Protocol, or MFT , is now supported, but in the past, it was not. There are products that have been developed from customer needs, such as products that can transfer files from source to destination with integration to MetaDefender.

    What is most valuable?

    The detection rate of the MetaScan multi-scanning feature is very high. When discussing Linux with five engines or ten engines, it can detect most of the viruses that are tested. I have seen very few instances where customers reported a virus that was not blocked after a PT scan. When we verify these cases, we confirm they occurred. Of course, every engine has its own detection rate, and you cannot achieve 100 percent detection. When using MetaDefender especially on Windows, the detection rate is very high, and it increases as you use more engines. Most customers I see using eight or twelve engines on Windows have good results with both configurations. When customers use a large number of engines, such as twenty engines with integration to external scanners, the results look almost perfect because in cyber security, there is no 100 percent, but it is close to that.

    The effectiveness of Deep CDR in reconstructing files safely and without signatures is very effective. When people configure Deep CDR correctly, it performs as it should. Sometimes some files are negatively affected by CDR. If I must be specific about what could be helpful, it would be to create a policy or workflow in OPSWAT terminology that handles cases when CDR cannot be performed or harms the file. I am not certain if the system can check whether CDR has harmed a file, but I know of use cases where CDR was disabled because it made files unable to open or unable to open properly. I believe this is very effective and is the most effective engine of OPSWAT because customers ask for OPSWAT for two main reasons: the CDR capabilities and the multi-scanning engines.

    What needs improvement?

    Some feedback indicated that it takes too much time to configure certain policies because there are many options. Some people appreciate this because you can configure anything, but I believe MetaDefender should have a wizard or general policies that can be used for 80 percent of customers.

    I use the expanded file type and archive coverage feature sometimes, especially for customers who try to scan large archives with the deep scan capabilities of OPSWAT and Deep CDR. This provides full protection because it scans every single file, but sometimes it takes too long. When discussing CAB files or archives for patching or server updates and BIOS updates and operating system updates, the scanning process takes too long, and it was difficult for customers who sometimes decided not to scan because the scanning time was excessive.

    I use the reporting and audit visibility features. Some capabilities are lacking in reporting because we do not have full statistics that are easy for users to understand. If something requires checking and then referring to documentation to understand it, that is too much for most users. When looking at one of the statistics, you can see how many files have been scanned and then you see a number out of 500 or a different number if you change it. It is not a number of files or scan processes; it is a number of files inside a file. When you scan a PowerPoint presentation file, for example, it counts as forty different files because of all the sub-files. I understand from customers that when they look at the visualization data or statistics, they do not understand what is happening there.

    Most customers I see do not use the file-based vulnerability assessment feature. It has some good results about vulnerabilities, but I am not certain if it is that helpful because many organizations, when they deploy a file and see that there are vulnerabilities, still deploy it because it is part of the code. It can produce results, but those results do not cause any action. Many products have something more advanced than vulnerabilities and static scoring. They have tools that can inform you about a vulnerability, whether the vulnerability is exploitable, if it is weaponized, and if someone can use this vulnerability in your environment. The file-based vulnerability feature works, but for most people, they do not take any action based on the results or block files because of file-based vulnerabilities.

    For how long have I used the solution?

    I have been working in cyber security for almost eight years.

    What do I think about the stability of the solution?

    The stability of the system is very high. I have not experienced crashes or downloads when the server is rebooted, and the server runs well after rebooting. I have not seen errors frequently. I recall one problem with MetaDefender email where there was an unusual issue with some connections remaining open, but I found this kind of problem only once. Most of the time, it is very stable, and you can rely on MetaDefender Core and also email. The stability problems with OPSWAT occurred when they attempted to migrate one product, such as the email product, to a SaaS service; it was not stable in that environment.

    What do I think about the scalability of the solution?

    MetaDefender is very scalable. From what I understand, when you use one database for all instances, you can deploy ten different servers or ten different instances with a separate database for each one. You cannot check the status of scans in each one; you have to check each specific instance. When discussing a shared database, it is scalable, but the performance is harmed. I do not know the specific impact, but it is just a feeling I have.

    How are customer service and support?

    I have contacted the technical support of OPSWAT. The quality of answers from support has been very good most of the time. It can be useful when contacting support to mention what needs to be collected and what needs to be sent before opening the ticket. For example, if discussing an issue, support will probably ask for specific logs. This can save time because many vendors, when they check something and ask for logs, need those logs from the beginning. If you open a ticket and the answer is to proceed, and the answer after one day is that specific logs are needed, it is better to know that from the beginning.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The deployment of MetaDefender on Windows and Linux machines is very easy and quick. When discussing deployment of containers or deployment in Kubernetes  environments, it sometimes takes too long. The deployment of the sandbox product takes too long. The deployment of MetaDefender email security, core, and MetaDefender kiosk has very easy and quick deployment.

    What about the implementation team?

    One person can deploy MetaDefender. It is one of the products that can be managed by one person and managed easily, including the deployment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing of MetaDefender is about hundreds of dollars. If I remember correctly, when someone attempted to buy from us one instance of OPSWAT, it was about nine thousand dollars for multi-scanning with eight engines and also the CDR module. The pricing is good, but when you add additional engines, this is what causes most people not to use additional features. Every additional engine, not about scanning engines but other engines such as file-based vulnerabilities and so forth, requires another license. If customers could buy in one price the basic package, which includes CDR and multi-scanning, in one price, many people would prefer to do it. However, when it is necessary to pay for every single engine or single feature, I believe most customers do not want to use it for that reason.

    Which other solutions did I evaluate?

    I have used alternatives to MetaDefender, but not as an administrator, only as a user. I used some kiosk products similar to MetaDefender kiosk. There is an alternative called Sasa Software, I believe it is Sasa Scanner or Gateway Scanner. I used it, but the user interface is not as good as OPSWAT. The experience with this product is not as good as the experience with OPSWAT, and the time it took to scan some large files was very long. OPSWAT is the best alternative. I also see on customers' side another product called RESEC, and this product also was not a good experience. The user experience is not good enough in this field, and when users try to configure policies, it lacks features when compared to OPSWAT.

    What other advice do I have?

    The sandbox helps in cases of suspicious files. However, the sandbox alert indicates suspicious activity for many different files. When we test some files that we download from vendors' official sites for server BIOS upgrades or firmware upgrades on servers, such as files from Dell or HPE, these files are also considered suspicious for many use cases. The sandbox is good only for specific areas. If discussing email, it can be good. However, if discussing large files, the sandbox can indicate suspicious activity in almost every executable file. This causes customers not to believe in the results. They say it is suspicious, but it is fine to them. Even if something is actually suspicious, it does not receive attention because of the many files that should be legitimate but are considered suspicious.

    Perhaps the effectiveness of the sandbox and level of suspicious files can have two different levels. If asked how it can be better, a different score or different tag for suspicious files from known vendors and suspicious files from unknown vendors could help. Multiple levels of suspicious files, scores, or tags could be something that can be configured. For example, when using the sandbox to scan files that you download from the internet to different environments, such as air gap environments, and in this environment you manage IBM servers, if you scan the file and select that you are using it for IBM servers before scanning, it could be considered less suspicious. The system could also load a certificate of the file that you download and then determine whether it has a trusted certificate or a certificate that is probably good enough or probably not suspicious most of the time.

    I am not certain if MetaDefender can do anything else. Perhaps if they want to improve vulnerability management, instead of managing static CVEs, they could have a different method involving CVEs but something else as well. For example, CVEs that can be harmful because they are exploitable could be differentiated. However, this is something that cannot be managed at the MetaDefender level because it is just about files on a perimeter and does not understand the deployment of the environment because it is not running in the real environment. I am not certain if there is a way to do this better.

    There are some upgrades when MetaDefender has new features, so you have to upgrade. This is not about the upgrade of the engines that happen all the time if you have an internet connection or do it manually. The maintenance can take significant effort that causes most people not to upgrade and update it all the time. Considering offline users, offline environments, and environments with no internet, easier updates could be helpful. The upgrade of MetaDefender version, whether email or MetaDefender Core, is very quick. I would rate this review eight out of ten.

    Brody T.

    Consistent Background Scanning with Easy to Understand Results

    Reviewed on Jan 16, 2026
    Review provided by G2
    What do you like best about the product?
    File scanning runs consistently in the background and we have not seen noticeable slowdowns in applications or file services. The scan results are easy for non security teams to understand, which helps reduce escalations to IT. Integration was also straightforward, allowing us to add file inspection into existing systems without introducing new tools for staff to manage.
    What do you dislike about the product?
    The main effort is during rollout. Policies need careful adjustment so business files are not blocked unnecessarily. Once tuned, ongoing maintenance is minimal.
    What problems is the product solving and how is that benefiting you?
    It reduces operational risk caused by infected or suspicious files entering the environment. This leads to fewer disruptions, fewer support tickets, and a more stable IT environment overall.
    Nicolas M.

    Fast, Clear Scanning with File Sanitization That Keeps Workflows Moving

    Reviewed on Jan 15, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender protects against file based threats without forcing changes to existing security architecture. Scanning is fast and consistent, and the results are clear enough to automate actions. The option to sanitize files instead of blocking them helps maintain normal business workflows.
    What do you dislike about the product?
    Policy tuning requires attention, especially when dealing with archives or mixed file types. Early testing is important to prevent overly strict rules from interrupting normal traffic.
    What problems is the product solving and how is that benefiting you?
    It reduces exposure to file based threats coming from external users, vendors, and integrations. This lowers incident frequency, improves confidence in inbound content, and strengthens overall security posture without adding operational friction.
    Levi F.

    Reliable, Workflow Friendly Scanning with Easy to Use API

    Reviewed on Jan 15, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender fits well into automated workflows and runs reliably without manual intervention. The API responses are easy to consume in scripts and jobs, and scanning performance stays consistent even when tasks run in parallel.
    What do you dislike about the product?
    Some upfront policy tuning is needed to prevent automated jobs from failing on edge case file types.
    What problems is the product solving and how is that benefiting you?
    It adds automated file security checks without breaking hands-off workflows. This reduces risk from untrusted inputs while keeping automation reliable, predictable, and easy to maintain at scale.
    Parker S.

    MetaDefender Simplifies Consistent, Scalable File Scanning Across Platforms

    Reviewed on Jan 14, 2026
    Review provided by G2
    What do you like best about the product?
    MetaDefender makes it easier to enforce consistent file scanning across shared platforms. It scales well as usage grows and avoids each application having to build its own file security logic. Policies are flexible enough to support different risk levels while keeping a common security baseline.
    What do you dislike about the product?
    Some upfront planning and tuning are needed to align policies with multiple application teams.
    What problems is the product solving and how is that benefiting you?
    It centralizes file security at the platform layer. This reduces exposure from third party content and helps maintain consistent protection as new services are added.
    View all reviews