I have used MetaDefender for one and a half years, deploying it in different environments and managing a team of professional services that deploy MetaDefender products in customer environments. I talk with customers and am aware of use cases where new or additional needs arose after MetaDefender deployment. For example, customers needed to transfer files between source and destination using MetaDefender. I know that MetaDefender File Transfer Protocol, or MFT, is now supported, but in the past, it was not. There are products that have been developed from customer needs, such as products that can transfer files from source to destination with integration to MetaDefender.
Cyber Security Specialist at a insurance company with 1,001-5,000 employees
Real User
Nov 10, 2023
Our use case is pretty wide. We wanted to scan every file uploaded by our customers to our application. For example, our customers upload ID data files to the application, and our application contacts the Core server via API and scans the files. We have about 15 external-facing applications where a customer or agent can upload a data file. We have also integrated some of our network devices with the ICAP server for the same purposes. And we are scanning some files on our file shares.
Co Founder / CEO at a tech company with 11-50 employees
Real User
Apr 18, 2023
MetaDefender has various use cases, including email security, endpoint device control, and the use of USB devices. It can also clean traffic from websites and provide web protection environments, scan file uploads, and perform storage scanning. In summary, MetaDefender can scan content and files wherever they are located.
Advanced Threat Protection offers comprehensive tools designed to safeguard against sophisticated cyber threats. It provides proactive security measures, including threat detection and prevention, to ensure network and data integrity.These solutions utilize advanced analytics and machine learning to detect and neutralize potential threats in real-time, focusing on early identification of threats to minimize breaches. Its sophisticated capabilities are aligned with the evolving complexity of...
I have used MetaDefender for one and a half years, deploying it in different environments and managing a team of professional services that deploy MetaDefender products in customer environments. I talk with customers and am aware of use cases where new or additional needs arose after MetaDefender deployment. For example, customers needed to transfer files between source and destination using MetaDefender. I know that MetaDefender File Transfer Protocol, or MFT, is now supported, but in the past, it was not. There are products that have been developed from customer needs, such as products that can transfer files from source to destination with integration to MetaDefender.
Our use case is pretty wide. We wanted to scan every file uploaded by our customers to our application. For example, our customers upload ID data files to the application, and our application contacts the Core server via API and scans the files. We have about 15 external-facing applications where a customer or agent can upload a data file. We have also integrated some of our network devices with the ICAP server for the same purposes. And we are scanning some files on our file shares.
MetaDefender has various use cases, including email security, endpoint device control, and the use of USB devices. It can also clean traffic from websites and provide web protection environments, scan file uploads, and perform storage scanning. In summary, MetaDefender can scan content and files wherever they are located.