Site çevirileri için yapay zeka kullanıyoruz ve doğruluk için çaba göstersek de her zaman %100 kesin olmayabilir. Anlayışınız için teşekkür ederiz.
MetaDefender Core™

Advanced Threat Detection And
Prevention For Trusted File Workflows

MetaDefender Core is OPSWAT’s advanced threat detection and prevention platform for identifying file-borne threats before execution. It combines Deep CDR™ Technology, Metascan™ Multiscanning, adaptive sandboxing, Proactive DLP, and AI-powered malware detection to secure file workflows across critical infrastructure while supporting compliance and zero trust at the file level.

  • Turn Every File into a Trusted Asset
  • Neutralize Threats Before They Proliferate
  • Secure Anywhere, Scale Everywhere

OPSWAT 'ın Güvendiği Kişiler

0
Dünya Çapındaki Müşteriler
0
Teknoloji Ortakları
0
Uç Nokta Sertifikalı Üyeler

A Platform for Complete File Trust

MetaDefender Core delivers advanced threat detection and prevention for regulated environments. Using Predictive Alin AI, Deep CDR™ Technology, Metascan™ Multiscanning, Proactive DLP™, Adaptive Sandbox Threat Intelligence, File-based Vulnerability Assessment and SBOM, it stops zero-day attacks, aids compliance, and secures every file across security workflows without slowing your business.

Detect, Analyze, and Eliminate Malware and Zero-Day Attacks

Gelişmiş Tehdit Önleme

Combining industry-leading technologies like Metascan Multiscanning and Deep CDR™ Technology, MetaDefender Core detects and neutralizes embedded malware and zero-day threats.

Multi-Layered Security Architecture

A modular, policy-driven design that orchestrates scanning, sanitization, vulnerability assessment, and threat intelligence for consistent, high-volume protection across environments.

AI-Driven Threat Defense

Leveraging AI and machine learning to optimize every threat detection and prevention engine for faster, smarter, and more adaptive protection.

Centralized Policy Enforcement

Administrators can define and automate file handling policies to ensure consistent security standards across the entire organization, simplifying compliance and governance.

Seamless Integration and Scalability

Integrates easily with existing IT and OT systems through APIs, ICAP, and SDKs, adapting to complex infrastructures without disrupting operations.

Proven Protection for Regulated Environments

Trusted by governments, critical infrastructure operators, and over 2,000 global organizations, MetaDefender Core provides full control over data security while helping organizations meet regulatory requirements.

Tehditleri Durdurmak Pazar Lideri Teknoloji ile Başlar

OPSWAT'ın kanıtlanmış, dünya çapında güvenilir, ödüllü ve pazar lideri teknolojisi, dosya kaynaklı kötü amaçlı yazılımların kritik ortamlarınıza girmesini ve yayılmasını önler.

Tahmine Dayalı Alin AI

Tahmin için tasarlanmış,
Hız için geliştirilmiş

  • Derinlemesine dosya yapısı analizi
  • Sıfırıncı gün tehditleri üzerinde eğitilmiş makine öğrenimi modeli
Metascan Multiscanning

Daha Fazla Motor Bir Motordan Daha İyidir

  • Kötü amaçlı yazılımların neredeyse %100'ünü tespit eder
  • 30'dan fazla lider AV motoru ile aynı anda tarama yapar
%99,2 tespit
Max Engines paketi ile
Derin CDR™ Teknolojisi

Başkalarının Gözden Kaçırdığı Tehditleri Durdurun

  • 200'den fazla dosya formatını destekler
  • Çok seviyeli iç içe arşivleri özyinelemeli olarak sterilize eder
  • Güvenli ve kullanılabilir dosyaları yeniden oluşturma
%100 Koruma 
SE Labs'dan
Dosya Türü Algılama

Güvenlik Açısından Kritik İş Akışları için Gerçek Dosya Türü Algılama

  • Yapay Zeka Geliştirilmiş
  • Sahte dosya türlerini milisaniyeler içinde tespit eder
  • Performans kaybı olmadan satır içi uygulama
99+ Doğruluk
Gizlenmiş Uzantılar Üzerine
OPSWAT Teknolojiler Görüntü
Proaktif DLP

Hassas Veri Kaybını Önleme

  • Yapılandırılmamış metinleri önceden tanımlanmış kategorilere yerleştirmek ve sınıflandırmak için yapay zeka destekli modellerden yararlanma
  • 125'ten fazla dosya türünde PII, PHI, PCI gibi tespit edilen hassas bilgileri otomatik olarak sansürleyin
  • Görüntülerde Optik Karakter Tanıma (OCR) desteği
125+
Desteklenen dosya türleri
OCR
görüntüden metne tanıma
Uyarlanabilir Sandbox

Gelişmiş Emülasyon Tabanlı Sandboxing ile Kaçamak Kötü Amaçlı Yazılımları Tespit Edin

  • Dosyaları yüksek hızda analiz edin
  • Kaçınma önleyici sandbox motoru IOC'leri ayıklar
  • Sıfırıncı gün tehditlerini belirleme
  • API veya yerel entegrasyon yoluyla derin kötü amaçlı yazılım sınıflandırmasını etkinleştirin
100 kat daha fazla kaynak verimliliği
diğer sandbox'lara göre
Yerel ve API mevcuttur
ve sizi kötü amaçlı yazılımlardan korumaya yardımcı olmak için çalışıyoruz
Dosya Tabanlı Güvenlik Açığı Değerlendirmesi

Uygulama Zafiyetlerini Yüklenmeden Önce Tespit Edin

  • Kurulumdan önce yazılımı bilinen güvenlik açıklarına karşı kontrol etme
  • Cihazlar çalışır durumda değilken bilinen güvenlik açıklarına karşı sistemleri tarayın
  • Çalışan uygulamaları ve kütüphanelerini güvenlik açıklarına karşı hızlıca inceleyin
3M+
Aktif Cihazlardan Toplanan Veri Noktaları
30K+
Önem Derecesi Bilgileri ile İlişkili CVE'ler
  • Tahmine Dayalı Alin AI

    Tahmin için tasarlanmış,
    Hız için geliştirilmiş

    • Derinlemesine dosya yapısı analizi
    • Sıfırıncı gün tehditleri üzerinde eğitilmiş makine öğrenimi modeli
  • Metascan Multiscanning

    Daha Fazla Motor Bir Motordan Daha İyidir

    • Kötü amaçlı yazılımların neredeyse %100'ünü tespit eder
    • 30'dan fazla lider AV motoru ile aynı anda tarama yapar
    %99,2 tespit
    Max Engines paketi ile
  • Derin CDR™ Teknolojisi

    Başkalarının Gözden Kaçırdığı Tehditleri Durdurun

    • supportedFileTypeCount] dosya biçimlerini destekler
    • Çok seviyeli iç içe arşivleri özyinelemeli olarak sterilize eder
    • Güvenli ve kullanılabilir dosyaları yeniden oluşturma
    %100 Koruma 
    SE Labs'dan
  • OPSWAT Teknolojiler Görüntü
    Dosya Türü Algılama

    Güvenlik Açısından Kritik İş Akışları için Gerçek Dosya Türü Algılama

    • Yapay Zeka Geliştirilmiş
    • Sahte dosya türlerini milisaniyeler içinde tespit eder
    • Performans kaybı olmadan satır içi uygulama
    99+ Doğruluk
    Gizlenmiş Uzantılar Üzerine
  • Proaktif DLP

    Hassas Veri Kaybını Önleme

    • Yapılandırılmamış metinleri önceden tanımlanmış kategorilere yerleştirmek ve sınıflandırmak için yapay zeka destekli modellerden yararlanma
    • 125'ten fazla dosya türünde PII, PHI, PCI gibi tespit edilen hassas bilgileri otomatik olarak sansürleyin
    • Görüntülerde Optik Karakter Tanıma (OCR) desteği
    125+
    Desteklenen dosya türleri
    OCR
    görüntüden metne tanıma
  • Uyarlanabilir Sandbox

    Gelişmiş Emülasyon Tabanlı Sandboxing ile Kaçamak Kötü Amaçlı Yazılımları Tespit Edin

    • Dosyaları yüksek hızda analiz edin
    • Kaçınma önleyici sandbox motoru IOC'leri ayıklar
    • Sıfırıncı gün tehditlerini belirleme
    • API veya yerel entegrasyon yoluyla derin kötü amaçlı yazılım sınıflandırmasını etkinleştirin
    100 kat daha fazla kaynak verimliliği
    diğer sandbox'lara göre
    Yerel ve API mevcuttur
    ve sizi kötü amaçlı yazılımlardan korumaya yardımcı olmak için çalışıyoruz
  • Dosya Tabanlı Güvenlik Açığı Değerlendirmesi

    Uygulama Zafiyetlerini Yüklenmeden Önce Tespit Edin

    • Kurulumdan önce yazılımı bilinen güvenlik açıklarına karşı kontrol etme
    • Cihazlar çalışır durumda değilken bilinen güvenlik açıklarına karşı sistemleri tarayın
    • Çalışan uygulamaları ve kütüphanelerini güvenlik açıklarına karşı hızlıca inceleyin
    3M+
    Aktif Cihazlardan Toplanan Veri Noktaları
    30K+
    Önem Derecesi Bilgileri ile İlişkili CVE'ler
From Ingestion to Validation

MetaDefender Core File Processing Workflow

Every step is designed to protect your data. Any file entering MetaDefender Core follows a controlled, multi-stage workflow designed to detect, sanitize, and verify content before it’s released into secure networks. This process ensures that even complex, nested files are fully analyzed and compliant with organizational security policies. Each stage is modular, policy-driven, and optimized for performance and accuracy across IT, OT, and air-gapped environments.

MetaDefender Core in Action

Gain complete visibility and control over file security, from detection and sanitization to verification and delivery.

Workflow Management

Configure security aligned workflows to match your operational policies across email, file transfer, storage, or custom environments. Establish how files enter the system and how they are processed.

Modular-based Features

Use a modular set of layered detection and prevention engines including File Type Detection, Deep CDR™ Technology, Multiscanning, Proactive DLP, and Adaptive Sandbox. This allows you to design specific file processing flows that match your operational use cases and security requirements.

File Sanitization and Threat Prevention

Define how files are inspected and cleaned through strict file type detection, recursive archive extraction, and Deep CDR™ Technology policies. Configure rules that govern how content is analyzed, reconstructed, and approved before it is released to downstream systems.

Multi-AV Scanning Configuration

Configure antivirus engines based on the package you have licensed and tailor how they contribute to threat evaluation. Adjust detection scoring, engine selection, scanning depth, and performance settings to achieve balanced and comprehensive threat coverage.

Dosya Tabanlı Güvenlik Açığı Değerlendirmesi

Enable vulnerability analysis for files, installers, and executables. Set rules to detect outdated libraries and known vulnerabilities before allowing file usage.

Data Loss Prevention Rules

Define policies that identify and protect sensitive information through AI-powered data classification and pattern detection. Configure rules to address insider threat risks, monitor sensitive file movement, and enforce actions such as redaction, blocking, or alerting based on policy requirements.

Adaptive Sandbox Analysis

Enable emulation-based sandbox analysis for files that require deeper inspection. Configure how potentially unsafe content is executed in a controlled virtual environment, how behavior is evaluated, and how MetaDefender Core adjusts analysis depth based on file type, risk level, or workflow policy.

Uploading File for Scanning

Enable emulation-based sandbox analysis for files that require deeper inspection. Configure how potentially unsafe content is executed in a controlled virtual environment, how behavior is evaluated, and how MetaDefender Core adjusts analysis depth based on file type, risk level, or workflow policy.

Concurrent Scanning with Multiple Engines

Files are going through different engines for malware and risk check. This process ensures that any potentially malicious content could not slip through the perimeter and reach end users.

Processing History and Reporting

Review processed files, threats detected, policy actions, and system metrics. Generate reports for audits, compliance, and operational reviews.

System Administration and Health Monitoring

View a unified dashboard that summarizes processed files and threat activity. Access executive reports with detailed scan results. Monitor system availability and key resource metrics such as CPU, RAM, and engine status to maintain reliable performance.

Integration and Automation Settings

Connect MetaDefender Core to your infrastructure including SIEM, SOAR, ICAP servers, API workflows, and storage systems. Set logging and alerting preferences for automated responses.

  • Workflow Management

    Configure security aligned workflows to match your operational policies across email, file transfer, storage, or custom environments. Establish how files enter the system and how they are processed.

  • Modular-based Features

    Use a modular set of layered detection and prevention engines including File Type Detection, Deep CDR™ Technology, Multiscanning, Proactive DLP, and Adaptive Sandbox. This allows you to design specific file processing flows that match your operational use cases and security requirements.

  • File Sanitization and Threat Prevention

    Define how files are inspected and cleaned through strict file type detection, recursive archive extraction, and Deep CDR™ Technology policies. Configure rules that govern how content is analyzed, reconstructed, and approved before it is released to downstream systems.

  • Multi-AV Scanning Configuration

    Configure antivirus engines based on the package you have licensed and tailor how they contribute to threat evaluation. Adjust detection scoring, engine selection, scanning depth, and performance settings to achieve balanced and comprehensive threat coverage.

  • Dosya Tabanlı Güvenlik Açığı Değerlendirmesi

    Enable vulnerability analysis for files, installers, and executables. Set rules to detect outdated libraries and known vulnerabilities before allowing file usage.

  • Data Loss Prevention Rules

    Define policies that identify and protect sensitive information through AI-powered data classification and pattern detection. Configure rules to address insider threat risks, monitor sensitive file movement, and enforce actions such as redaction, blocking, or alerting based on policy requirements.

  • Adaptive Sandbox Analysis

    Enable emulation-based sandbox analysis for files that require deeper inspection. Configure how potentially unsafe content is executed in a controlled virtual environment, how behavior is evaluated, and how MetaDefender Core adjusts analysis depth based on file type, risk level, or workflow policy.

  • Uploading File for Scanning

    Enable emulation-based sandbox analysis for files that require deeper inspection. Configure how potentially unsafe content is executed in a controlled virtual environment, how behavior is evaluated, and how MetaDefender Core adjusts analysis depth based on file type, risk level, or workflow policy.

  • Concurrent Scanning with Multiple Engines

    Files are going through different engines for malware and risk check. This process ensures that any potentially malicious content could not slip through the perimeter and reach end users.

  • Processing History and Reporting

    Review processed files, threats detected, policy actions, and system metrics. Generate reports for audits, compliance, and operational reviews.

  • System Administration and Health Monitoring

    View a unified dashboard that summarizes processed files and threat activity. Access executive reports with detailed scan results. Monitor system availability and key resource metrics such as CPU, RAM, and engine status to maintain reliable performance.

  • Integration and Automation Settings

    Connect MetaDefender Core to your infrastructure including SIEM, SOAR, ICAP servers, API workflows, and storage systems. Set logging and alerting preferences for automated responses.

AI-Enhanced Engines

for Faster, Smarter Threat Detection

100 Koruma

Verified by SE Labs for Deep CDR™ Technology

Tarafından güvenilir

2,000+

Organizations
Worldwide

99%+

Malware Detection Accuracy Across 30+ Anti-Malware Engines

200+ File Types and
30+ Archive Formats

Desteklenen

#1 Numaralı Pazar Lideri

in Multiscanning and CDR
Technology

Complete File Security With MetaDefender Core

Dosya Yükleme Güvenliği

MetaDefender Core protects public portals and applications from file-borne threats by sanitizing every uploaded file with Deep CDR™ Technology and scanning in parallel with 30+ anti-malware engines. It applies zero-trust principles at the perimeter, detects spoofed file types, and inspects encrypted archives to prevent ransomware and data leakage without disrupting the user experience.

File Download Security

MetaDefender Core ensures downloads are free from potential malware across browsers and secure web gateways by applying deep file sanitization and multi-engine malware scanning before execution. It blocks disguised or evasive threats that standard filters miss, maintains productivity, and provides full audit visibility for compliance and investigation.

Secure AI and ML Data Pipeline

MetaDefender Core secures AI data pipelines and workflows by sanitizing and validating every dataset, model, and dependency before use. It detects malware and vulnerabilities in ML artifacts, generates SBOMs for software transparency, and applies Proactive DLP to protect sensitive data, enabling trusted and compliant AI development and deployment.

Secure Forensics Investigation for SOC Teams

MetaDefender Core enables SOC and forensics teams to safely analyze suspicious files without execution. It neutralizes embedded threats with Deep CDR™ Technology, detects evasive malware through adaptive sandboxing, and provides audit-ready logs to maintain chain of custody, accelerating triage and investigation in offline or air-gapped environments.

Deploy Anywhere. Secure Everywhere.

Designed for complex and regulated environments, MetaDefender Core adapts to your architecture and security needs while maintaining performance, resilience, and compliance.

Şirket İçi

Ideal for high-security and controlled environments. Maintain full data sovereignty while ensuring predictable performance and centralized management.

Cloud

Best for teams that prefer managed infrastructure and quick setup. Integrates seamlessly with cloud-based workflows to enable fast, scalable protection.

Cloud Görüntüsü

Launch a pre-configured MetaDefender Core instance on AWS, Azure, or GCP for instant deployment and on-demand file scanning.

Konteynerli

Optimized for Kubernetes-native and containerized environments. Supports dynamic scaling and flexible orchestration for modern teams.

Dağıtılmış Küme

Designed for large-scale or mission-critical environments. Provides parallel processing, high availability, and centralized control for uninterrupted security.

Proven Protection for the World’s Most Secure Environments

HAKKINDA

Located in the southwestern part of Hokkaido Island, Japan, Muroran City is a key manufacturing hub for the country’s steel industry. The city’s more than 1,000 employees handle a large number of files daily, making it essential to maintain a secure network. A top priority is ensuring that files transferred from external sources into the internal network are completely secure and free of malware.

KULLANIM DURUMU

Muroran City faced the challenge of protecting its critical infrastructure from cyberattacks while complying with new Japan’s MIC (Ministry of Internal Affairs and Communications) strict cybersecurity regulations introduced after a 2015 data breach. To meet these requirements and maintain operational continuity, for the past four years, Muroran City implemented OPSWAT’s MetaDefender Core, with Deep CDR™ Technology and Metascan technologies.

KULLANILAN ÜRÜNLER:

HAKKINDA

Fuji City, located on the eastern side of Shizuoka Prefecture in Japan, strategically positioned between Mt. Fuji, Suruga Bay, and the Fuji River. Beyond its scenic landscape, the city stands out for its proactive approach to cybersecurity. The local government has developed strong infrastructure and prevention plans, serving as an example of how Japanese municipalities are enhancing protection against cyberattacks.

KULLANIM DURUMU

Fuji City faced challenges meeting Japan’s new cybersecurity standards requiring strict three-layer network separation following information leaks at their Pension Service. Fuji City’s previous sanitization tool lacked performance, so they adopted OPSWAT MetaDefender Core with Deep CDR™ Technology and Metascan Multiscanning, enabling fast, reliable file sanitization and full compliance with national security guidelines.

KULLANILAN ÜRÜNLER:

HAKKINDA

A highly specialized and confidential research organization dedicated to combating computer crime relies on MetaDefender Core to strengthen its forensic investigations. Working closely with law enforcement, the team focuses on uncovering and analyzing malware from criminal devices, addressing complex security challenges that traditional tools cannot solve.

KULLANIM DURUMU

Faced with a substantial backlog of criminal computers and the constant evolution of malware, the specialized research team supporting law enforcement struggled to efficiently detect and analyze threats using traditional forensic tools. To overcome these limitations, they implemented OPSWAT MetaDefender Core, which streamlined malware detection, improved accuracy, and transformed their ability to investigate and understand complex cybercrimes.

KULLANILAN ÜRÜNLER:

HAKKINDA

Clalit, Israel’s largest healthcare provider and one of the world’s biggest HMOs, has been a leader in medical innovation for over a century. Serving 4.9 million patients across a vast network of hospitals and clinics, Clalit integrated OPSWAT’s advanced infrastructure security to protect its extensive patient data and ensure the highest standards of cybersecurity in its operations.

KULLANIM DURUMU

As cyberattacks on healthcare organizations increased significantly, Clalit Health Services faced rising threats from ransomware and zero-day attacks. To protect its sensitive data, Clalit partnered with OPSWAT and built a strong file security system using MetaDefender Core, Metascan Multiscanning, Deep CDR™ Technology, Adaptive Sandbox, and MetaDefender ICAP Server™, ensuring complete protection across its network.

Aid Compliance with Regulatory Requirements

Designed for regulated environments, MetaDefender Core enforces secure file handling and documentation practices aligned with major global standards. Boost your compliance posture without compromising business continuity.

3 Basit Adımda Başlayın

1

Uzmanlarımızla İletişime Geçin

1

Uzmanlarımızla İletişime Geçin

Review your cybersecurity goals, assess your current workflows, and find the best deployment plan for your environment. Fill out the form below to get started.

2

Sorunsuzca Entegre Edin

2

Sorunsuzca Entegre Edin

MetaDefender Core integrates easily via REST API with portals, file shares, email systems, and DevOps pipelines.

3

Güvenle Koruyun

3

Güvenle Koruyun

With MetaDefender Core, your environment gains continuous protection from file-borne threats using our market-leading Metascan Multiscanning, Deep CDR™ Technology, and Threat Intelligence technologies. Get in-depth analyses, comprehensive assessment reports, and actionable recommendations.

  • Uzmanlarımızla İletişime Geçin

    Review your cybersecurity goals, assess your current workflows, and find the best deployment plan for your environment. Fill out the form below to get started.

  • Sorunsuzca Entegre Edin

    MetaDefender Core integrates easily via REST API with portals, file shares, email systems, and DevOps pipelines.

  • Güvenle Koruyun

    With MetaDefender Core, your environment gains continuous protection from file-borne threats using our market-leading Metascan Multiscanning, Deep CDR™ Technology, and Threat Intelligence technologies. Get in-depth analyses, comprehensive assessment reports, and actionable recommendations.

Take Full Control of Your File Security

Formu doldurun, 1 iş günü içinde sizinle iletişime geçelim.
Dünya çapında 2.000'den fazla işletme tarafından güvenilen bir marka.