MetaDefender Core allows you to integrate advanced malware protection and detection into your IT solutions and applications, for instance to secure web portals from file upload attacks, enhance cyber security products, and develop malware analysis systems.
Using our REST API, you can easily leverage MetaDefender’s high-speed multiscanning, deep content disarm and reconstruction (Deep CDR), and file-based vulnerability assessment technologies, preventing zero-day attacks and unknown threats as well as providing close to 100% known threat detection, without affecting performance. MetaDefender Core also includes proactive data loss prevention (Proactive DLP) capabilities to detect and block sensitive content in files.
MetaDefender Core Features
Deep Content Disarm and Reconstruction (Deep CDR)
Sanitize and reconstruct over 30 common file types, ensuring maximum usability with safe content. Over 100 file reconstruction options are available. For example, to allow you to flatten files to less complex formats.
Choose from over 30 leading anti-malware engines in flexible package options. Third party anti-malware licenses are included.
File-Based Vulnerability Assessment
Scan binaries and installers to detect known application vulnerabilities before they are executed on endpoint devices, including IoT devices.
Proactive Data Loss Prevention (Proactive DLP)
Content-check 30+ common file types for sensitive information before they are transferred.
Use almost any programming language to leverage MetaDefender technology
File Type Verification
Verify over 4500 File types to combat spoofed file attacks
Create your own workflow for multiscanning and deep content disarm and reconstruction (Deep CDR) and customize the order and process in which files are handled, based on user, file source, and file type.
Deploy on Windows or Linux servers in your environment, even if it is air-gapped, or in our cloud using MetaDefender.com.
Multiscanning and deep content disarm and reconstruction (Deep CDR) for more than 30 types of compressed files. Archive handling options are configurable, and encrypted archives are supported.
- Prevent File-borne Threats
- Protect Sensitive Information
- Easy Deployment via REST API
- Maximize Threat Detection
- High Performance