Overview

Product video
OPSWAT MetaDefender ICAP Server offers an advanced multi-layer security platform that prevents malicious traffic from infiltrating your AWS Cloud deployment to protect your mission-critical data from deliberate theft or inadvertent leakage and compromise. The solution combines superior malware detection with market-leading threat detection and prevention with multiscanning, broad file-type Deep CDR (Content Disarm and Reconstruction), and vulnerability scanning and reporting of installers, binaries or applications. MetaDefender ICAP offers flexible deployment options via AMI, along with support for containers and Amazon EKS. Integrates in minutes to any ICAP-enabled network appliances, enterprise storage solutions, NGINX ingress controller, or managed file transfer (MFT) solutions.
Highlights
- Quickly scan all files with top 30+ antivirus engines to detect over 99% of known malware.
- Recursively sanitize 100+ file types with market-leading Deep CDR technology to remove all potential embedded threats.
- Easily integrate with any ICAP-enabled network device to scan files before they enter the environment.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
MD ICAP Server LX | Annual subscription for MetaDefender ICAP Server | $1,200,000.00 |
Vendor refund policy
Please contact Sales for more information: apn-sales@opswat.com
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
Resources
Vendor resources
Support
Vendor support
Please visit https://www.opswat.com/support/contact-support to obtain support, software and related modules. A license key will be provided by your OPSWAT Sales representative. Minimum system requirements: https://www.opswat.com/docs/mdicap/installation/system-requirements Instructions for Kubernetes environments: https://www.opswat.com/docs/mdicap/cloud-deployment
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Advanced threat controls have secured endpoints and simplified safe device access to the network
What is our primary use case?
The use cases for MetaDefender involve checking an endpoint, such as a laptop or USB, to ensure that they are safe, clean, and meet security policy before they connect to the network. I can use it for malware and unknown devices' security status.
What is most valuable?
The best feature of MetaDefender is that it can isolate USB devices from the connected network, blocks malware and unsafe files, and ensures all endpoints follow security policy, so that my organization remains safe and reduces the risk of these threats.
I find MetaDefender effective when it comes to blocking or sanitizing content based on the policies in place because it removes hidden threats and scans devices and endpoints, protecting the environment against unknown and advanced attacks.
The integration of Multi-Scanning and Content Disarm and Reconstruction affects my data security operations positively as it is easy to integrate into my environment.
I find the multi-scanning mechanism and content disarm and reconstruction features beneficial for data security, as MetaDefender's endpoint creates a secure layer to protect my organization from threats and attacks.
The main benefits that MetaDefender brings include isolating USB devices from attacks, removing hidden threats such as malware and malicious attacks, and protecting against unknown and advanced attacks.
My impression of the detection rates provided by MetaScan Multi-Scanning is that they are good, as the scanning of MetaDefender removes hidden threats, detects known issues, and protects devices from unknown malware and attacks.
I assess the effectiveness of Deep CDR in reconstructing files safely without signatures. CDR used in MetaDefender effectively removes dangerous and unsafe attacks by taking a file, removing risky parts, and delivering a clean version to the user, as it removes scripts, hidden links, and malicious components.
I use Adaptive Sandbox Analysis and a sandbox to detect advanced threats, as it receives files, runs them in a VM environment, and discovers the behavior of these files, allowing safe files to return while blocking any that behave poorly.
I find that the features of MetaDefender are strong, and its work is effective for scanning and securing the environment from malware and operates well.
What needs improvement?
I am not using the expanded file type and archive coverage feature because I was unaware of it.
I am not using the enhanced reporting and audit visibility features, and I am unsure about them.
Regarding the reporting, analytics, and audit visibility, I cannot provide a comprehensive answer. I do not know if the audit requirements help me with deep enhanced reporting and audit visibility in MetaDefender.
I have not noticed any improvements in workflow automation with recent enhancements to policy orchestration and engine parallelization.
What I would like to see improved in MetaDefender includes reducing the high cost of the license, as the pricing is very high.
Functionality-wise, I find installation and setup very difficult, and I needed support to help me understand the setup of MetaDefender. The process requires good planning and understanding of the environment to configure it, as the integration with policies takes more time to build and requires more experience.
For how long have I used the solution?
I have been using MetaDefender for one year.
What do I think about the stability of the solution?
When it comes to stability, I find it stable as it maintains good external stability with good availability and no major issues. The setup is difficult, but generally, the product stability is good.
What do I think about the scalability of the solution?
I find it scalable, as more users can work smoothly without any crashing or slowing down.
How are customer service and support?
I evaluate customer service and technical support as good, as they respond in a timely manner.
Which solution did I use previously and why did I switch?
Before MetaDefender, I used EDR, which is the product that I used before switching to MetaDefender.
How was the initial setup?
The deployment process was difficult; I needed a vendor to help me because the setup of MetaDefender is complex.
What about the implementation team?
SIS helped me to deploy MetaDefender.
What was our ROI?
I believe it is worth the money, as it brings time-saving, cost-saving, and efficiency improvements, especially in large environments. However, in smaller environments, it incurs high costs. Overall, it is good because it has many features for scanning and cleaning the environment from malware and saves time.
What's my experience with pricing, setup cost, and licensing?
I do not find it cost-effective, as the costing is high.
Which other solutions did I evaluate?
I decided to switch to MetaDefender because Kaspersky could only detect malware but not take action, whereas MetaDefender detects and prevents threats simultaneously.
I chose MetaDefender because it is capable of adding multi-layered security that prevents threat detection and removes unknown threats, working without signature-based detection, which is beneficial.
What other advice do I have?
I recommend MetaDefender to others because it is effective, has high stability, and is beneficial for environments. I have rated this review a ten out of ten.
Advanced file sanitization has reduced email threats and saves SOC teams significant analysis time
What is our primary use case?
My main use case for MetaDefender is for our client's environment, which is using MetaDefender for their OT security or for their email side. All clients use MetaDefender, and it is especially great for Content Disarm and Reconstruction, which they want to leverage.
For example, one of our clients is using MetaDefender for their email gateway site as their mail gateways, scanning emails. Generally, they use MetaDefender's Content Disarm and Reconstruction property for that email scanning.
None of my customers are using the reporting and audit visibility features on MetaDefender platform.
Integrating multi-scanning and Content Disarm and Reconstruction positively affects my clients' data security operations, prioritizing security over potential delays experienced by end users.
What is most valuable?
The best features MetaDefender offers include its Content Disarm and Reconstruction, which is a key feature chosen by our clients because many other products claim to provide that functionality, but generally, they cannot do it as cleanly. Through Proof of Concept sessions with our clients and the OPSWAT team, they see that MetaDefender's Content Disarm and Reconstruction is strong, usable, and valuable for our customers, making them want to work with OPSWAT specifically for this feature.
For example, one of our customers was not using any Content Disarm and Reconstruction technology but was receiving emails containing PDF documents or XLSX documents, some with malicious content. MetaDefender's technology worked effectively, disarming and reconstructing PDFs to deliver clean copies to their users, while allowing their analysts to see the malicious code.
MetaDefender has positively impacted my clients' organizations by saving time for their SOC teams who were previously receiving false positives and unnecessary alarms from other products, allowing them to focus on analyzing real threats, which has led to fewer incidents.
For one of my clients, a major bank in Turkey, they reported saving approximately 30 percent of their SOC time on analyzing emails since implementing MetaDefender.
MetaScan multi-scanning feature is excellent because it provides multiple vendors for scanning. If one vendor fails, the others remain operational, ensuring continued protection.
Assessing the effectiveness of Deep Content Disarm and Reconstruction in reconstructing files safely and without signatures reveals it to be effective, as clients receive identical documents without changes other than the removal of malicious code.
MetaDefender's file-based vulnerability assessment analyzes binaries and installers for known vulnerabilities before they enter a network, providing a proactive defense that is highly valuable for our customers.
What needs improvement?
While MetaDefender's mail gateway already gives fewer false positives, there is still room for improvement in reducing those even further.
Additionally, MetaDefender could benefit from a better graphical user interface for administrators, making it more usable, although this is not an urgent need but an area for potential improvement.
For how long have I used the solution?
I have been using MetaDefender for three years.
Which solution did I use previously and why did I switch?
It was a fresh sell to our customers for MetaDefender, and I evaluated other options before choosing MetaDefender.
What was our ROI?
I have not seen a direct return on investment, but clients have noted that the product saves time and may reduce the need for fewer employees since the SOC team focuses on critical incidents as MetaDefender handles current analyses efficiently.
What's my experience with pricing, setup cost, and licensing?
Pricing, setup costs, and licensing are handled by my sales team, but feedback indicates that our pricing is better than other vendor solutions.
Which other solutions did I evaluate?
I can specify that my clients considered other options before choosing MetaDefender.
What other advice do I have?
I do not have anything else to add about how my clients use MetaDefender. My review rating for MetaDefender is ten out of ten.
File sanitization has blocked phishing payloads and now reduces manual incident analysis
What is our primary use case?
MetaDefender is used in one of our client environments where every file upload to their web portal goes through the scanning process. It scans using multiple engines and applies CDR before allowing the file into the system. This has helped us stop suspicious documents even before users interface with them.
With the increase in phishing and document-based attacks recently, this kind of file sanitization layer has become very important for us.
What is most valuable?
MetaDefender offers some of the best features such as multiple engine malware scanning, content disarm and reconstruction (CDR), deep file inspection, and strong API-based integrations. Deep file inspection is the feature I find myself using the most, as it helps in my workflow significantly. The multi-engine approach gives more confidence compared to relying on a single antivirus engine, especially for zero-day threats.
MetaDefender's effectiveness in blocking or sanitizing content based on policy is very strong. A combination of multi-engine scanning and CDR makes a big difference. It does not just rely on a signature; it enforces policy at the file level. Policies like blocking files with high-risk indicators, sanitizing documents with embedded macros, and allowing only clean files into the environment show its strengths. MetaDefender is very effective in sanitizing files without breaking usability. The integration of multi-scanning and Content Disarm and Reconstruction affects our data security operations. MetaDefender plays a very important role in today's threat landscape, which heavily uses documents and file-based payloads.
What needs improvement?
The UI can be more user-friendly, and initial steps and policy tuning take some time. Reporting can be improved as extracting detailed insights for management reports takes extra effort.
For how long have I used the solution?
I have been using MetaDefender for 1.5 to 2 years.
What do I think about the stability of the solution?
MetaDefender is stable. We have not faced major downtime.
What do I think about the scalability of the solution?
MetaDefender's scalability is excellent, as it handles larger volumes of file scanning without major issues.
How are customer service and support?
Support for MetaDefender is very responsive, though sometimes complex issues take time to resolve.
Which solution did I use previously and why did I switch?
We evaluated sandbox-based solutions and some email security tools, but MetaDefender's CDR approach was more practical.
What was our ROI?
MetaDefender has positively impacted my organization by reducing the risk of file-based attacks, which has significantly improved our overall defense against phishing and malware delivery techniques. We have seen around a 40% drop in malicious file incidents, and our SOC team is spending less time on manual file analysis now.
What other advice do I have?
MetaDefender is a very time-saving and effort-saving tool. I advise others looking into using MetaDefender to understand their file flow properly before deployment. If integrated correctly, it becomes a very strong layer against modern file-based attacks.
Threats in a file are cleaned before they reach the core, creating a silent shield in place. The SOC workload has reduced because fewer suspicious files reach analysis, and users do not complain much since files still open normally after sanitization. I would rate this review an 8.
Multi-engine analysis has strengthened file security and now stops hidden threats in attachments
What is our primary use case?
I primarily use it for file security and malware analysis, helping me scan files, detect threats, and validate suspicious attachments before they reach end users. The multi-engine scanning and sandbox analysis provide an extra layer of security to the environment, ultimately improving detection capability and reducing the risk of malware infection.
One instance involved a user receiving a suspicious email attachment that appeared normal, but MetaDefender flagged it through one of its engines, leading to a deep analysis that revealed it was malicious. This helped us block the file before it reached end users.
Another important use case is that it helps us scan email attachments and downloadable files using its sandbox capability, detecting malware with multiple antivirus engines and validating suspicious files during investigations. As a SOC team, whenever we receive a suspicious file or alert, we use MetaDefender to analyze it before taking any action.
What is most valuable?
The best features of MetaDefender include strong sandbox analysis, file reputation, threat intelligence, and data sanitization, which removes hidden threats from files and provides better confidence during investigations. Rather than relying on a single antivirus engine, MetaDefender checks files using multiple engines, which truly helps.
I find myself relying most on sandbox analysis and file reputation, which are two features I genuinely appreciate from this tool. The sandbox analysis, file reputation, and threat intelligence stand out as key features.
MetaDefender positively impacts the organization by reducing the risk of malware entering our security environment, providing faster file analysis during incidents, and improving our confidence when handling suspicious attachments. Sometimes, files that traditional scanners deem safe may contain malicious elements, so using MetaDefender gives us the assurance we need when investigating malware or attachments.
The Deep CDR feature effectively removes risky content and rebuilds safe files, neutralizing even unknown threats. Unlike signature-based detection that only addresses known threats, CDR works by eliminating suspicious content, making it superior in practical scenarios where files such as PDFs and Office documents can be safely delivered to users without risk while maintaining usability.
What needs improvement?
I think scanning time can sometimes be a bit slow for larger files, and the user interface could be improved. The licensing cost is somewhat high for smaller organizations like ours, so these are my personal suggestions for improvement.
They should consider integrating live threat intelligence data so that if any attachment is detected in a security environment somewhere in the world, it could show where else this file has been delivered.
I would rate MetaDefender an eight out of ten, primarily because it experiences slight delays in scanning larger files, and both the user interface and pricing could be optimized.
For how long have I used the solution?
I have been using MetaDefender for two years.
What do I think about the stability of the solution?
MetaDefender has very good stability with no major issues.
What do I think about the scalability of the solution?
In terms of scalability, MetaDefender is well-suited for enterprise environments.
Which solution did I use previously and why did I switch?
Previously, we used traditional antivirus solutions that utilized only single engines, which is why we switched to MetaDefender, as it offers numerous features and capabilities that are advanced compared to traditional antivirus solutions.
What was our ROI?
We see a return on investment as MetaDefender prevents malware incidents, saves investigation time for SOC analysts, and reduces the overall impact of threats. This indirectly saves costs and efforts for organizations that implement it.
What's my experience with pricing, setup cost, and licensing?
The pricing of MetaDefender is on the higher side, especially for startups like ours, and the integration with email security file upload systems functions well. The cost depends on the number of engines purchased and the features chosen, but for those considering multi-layer security, it is worth it for enterprises.
Which other solutions did I evaluate?
Before choosing MetaDefender, we evaluated basic antivirus and file scanning solutions that were already part of our environment. These tools only provided single-engine detection and were limited in their coverage and advanced features such as multi-engine scanning and CDR. MetaDefender was ultimately selected for its comprehensive approach that combines multiple antivirus engines and sandbox analysis with file sanitization.
What other advice do I have?
The file-based vulnerability assessment feature in MetaDefender is very valuable for identifying vulnerabilities before deployment, especially in environments where files or applications are frequently shared. It detects outdated components, known vulnerabilities, or risky configurations within files prior to execution, which is essential since many vulnerabilities arise from outdated libraries or insecure files. From a SOC perspective, this feature offers a proactive layer of security, enabling teams to identify and fix issues before they escalate into incidents.
We use the audit visibility feature in MetaDefender, which helps during audits by providing reports that demonstrate which files were scanned and what threats were identified. This is particularly useful when explaining our security protocols to client-side technicians. For example, during an audit, we can show the report of scanned files as proof that our security checks are in place.
From my experience, MetaDefender is quite effective in blocking and sanitizing content based on defined policies, allowing organizations to set rules for file handling such as blocking high-risk files and sanitizing them with CDR before delivery. This is crucial because it ensures that even if files contain hidden threats, they can be reconstructed safely for sharing. For the SOC, this minimizes the risk of malware reaching end users and allows for flexibility in fine-tuning policies based on our security environment. In practice, it automates decision-making, reducing the need for manual analysis and enforcing strong security policies.
For organizations dealing with email attachments and file uploads or downloads, my advice is that MetaDefender is a very useful tool as it adds an extra security layer and assists SOC teams in validating threats more confidently.
During my use, I have not observed any major downtime or performance issues. Overall, MetaDefender is a strong solution for file security, especially for handling email attachments and downloadable files. The multi-engine scan and CDR feature provide an extra layer of protection, effectively preventing both known and unknown threats. I would rate this solution an eight out of ten overall.
File sanitization has protected critical networks and prevents hidden malware from entering
What is our primary use case?
MetaDefender serves as a file security gateway that scans, cleans, and sanitizes files before they are allowed on the network, which stops malware, ransomware, zero-day attacks, and any kind of malicious files from entering the network.
For one of our partners, we were dealing with a large financial services business handling mortgage applications. When files were scanned into the network, every single file that was sent was then scanned by the multi-scanner, and if any contained even a slight amount of malware, we performed deep CDR file sanitization that removed everything that could be malicious and rebuilt the file.
The main use cases that we tend to see are all the antivirus engines as part of the multi-scan, and the second use case that is emerging frequently is file sanitization, also known as deep CDR.
What is most valuable?
In my experience, the best features MetaDefender offers include the number of different antivirus engines that can scan files through multi-file scanning, often using 20 to 30 engines, with the top premium package around 33 engines, capturing 80 to 90% of malware in all those files. If any engine detects malware, the file is blocked, which increases detection because different engines catch different malware.
When dealing with central government and defense, we find that if there is any kind of malware on the network or the file, whether that is a software file, hard disk file, or a pen drive, it cannot be allowed on the network. This is when we put it into the sandbox and perform file sanitization to ensure that nothing malicious comes into the network.
Whenever we are dealing with central government or defense contracts, MetaDefender's core philosophy of trusting no file means it scans files, rebuilds them, and verifies their reputation, ensuring they contain no malicious content. This positively impacts our organization by detecting malware and stopping any kind of data leaks through the network.
In terms of measurable outcomes across central government and defense, we are seeing saved time when files go through the antivirus file scanners. In financial services, such as with mortgage applications, the process sends files straight into MetaDefender file scanning that cleans out any malicious content.
What needs improvement?
I don't think there are many feature improvements needed; it's a great solution. The main thing is just the pricing because it's such a top-end enterprise product. For smaller partners with a customer base that isn't as affluent, the price can be a barrier, making it more of a 'nice-to-have' for their budgets compared to cheaper competitors.
For how long have I used the solution?
I've been using MetaDefender for just under 18 months.
What do I think about the stability of the solution?
MetaDefender is 100% stable, making it one of the best cybersecurity solutions we offer, which provides confidence in promoting and recommending it to others.
What do I think about the scalability of the solution?
MetaDefender's scalability is considerable. We handle vast amounts of traffic from banking, defense, and critical national infrastructure, ensuring that even one malicious file does not enter our networks.
How are customer service and support?
Customer support from Opswat is commendable. Their customer service team, distribution team, and regional sales managers provide excellent aftercare and set us up for upselling across the entire MetaDefender portfolio.
From a partner's perspective, the channel team and customer service have delivered strong support. I would rate it a nine because I have not interacted with customer support directly, though the support provided has been strong.
Which solution did I use previously and why did I switch?
We have not used a different solution. We focus on best-in-breed vendors, with Opswat being our chosen solution due to its effectiveness in the market.
What was our ROI?
I believe we see a return on investment through time savings and reduced need for unnecessary personnel. Having both cloud and on-premise solutions enables effective file sanitization and vulnerability detection while preventing attacks that save costs and protect reputation.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, setup cost, and licensing, I find the pricing for kiosks, cloud, deep CDR, and adaptive sandbox appropriate. We are seeking more service partners for Opswat's professional services to ensure smooth implementation.
Which other solutions did I evaluate?
Before choosing MetaDefender, we considered alternatives such as Reversing Labs but found their offerings to be inferior, especially for our defense and central government contracts, where Opswat stands out as far superior.
What other advice do I have?
To achieve a perfect score of 10, MetaDefender would need to cater to every partner's ability to sell. While the price is a consideration, the benefits of scanning, removing, detecting, and sandboxing outweigh it significantly.
I advise those considering MetaDefender to reach out to reseller partners for guidance on file sanitization and to explore setting up a proof of concept to see the value MetaDefender brings, with demos available directly on their website.
My overall rating for this solution is 9.