This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
MetaDefender Cloud Community Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of MetaDefender Cloud Community for G2 to provide buying insight. Below are some alternatives with more reviews:
1
ESET PROTECT
4.6
(919)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
2
Coro Cybersecurity
4.7
(217)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
3
Intezer
4.5
(193)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
4
ANY.RUN Sandbox
4.7
(179)
ANY.RUN Sandbox is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.
5
Cloud-Delivered Security Services
4.4
(106)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
6
OPSWAT Filescan
4.6
(49)
OPSWAT Filescan is a comprehensive file scanning solution designed to detect and prevent threats in files before they reach your network. It utilizes advanced multi-scanning technology, combining multiple anti-malware engines to provide high detection rates and minimize false positives. This ensures that both known and unknown threats are identified effectively.
Key Features and Functionality:
- Multi-Scanning Technology: Integrates multiple anti-malware engines to enhance detection capabilities and reduce false positives.
- Real-Time Scanning: Provides immediate analysis of files to detect threats before they can cause harm.
- Flexible Deployment: Offers cloud-based and on-premises deployment options to suit various organizational needs.
- Comprehensive File Support: Supports a wide range of file types, ensuring thorough scanning across different formats.
- Scalability: Designed to handle high volumes of files, making it suitable for organizations of all sizes.
Primary Value and Problem Solved:
OPSWAT Filescan addresses the critical need for proactive threat detection in files, preventing malware and other malicious content from infiltrating networks. By leveraging multiple anti-malware engines, it significantly enhances detection rates and reduces the risk of false positives. This solution is particularly valuable for organizations seeking to strengthen their cybersecurity posture by ensuring that all files entering their systems are thoroughly scanned and verified as safe.
7
VIPRE Integrated Email Security
4.4
(39)
VIPRE Integrated Email Security provides Multi-layered security package for the best protection
8
VirusTotal
4.7
(35)
VirusTotal is a free online service that analyzes files and URLs to detect malware and other malicious content. By aggregating results from over 70 antivirus scanners and URL/domain blocklisting services, it provides a comprehensive assessment of potential threats. Users can submit files up to 650 MB or URLs for scanning, receiving detailed reports that include detection rates from various security vendors, behavioral analysis, and metadata extraction. This collaborative approach enhances the detection of threats that individual antivirus solutions might miss.
Key Features:
- Multi-Engine Scanning: Utilizes over 70 antivirus engines to analyze files and URLs, offering a broad detection capability.
- File and URL Analysis: Supports scanning of files up to 650 MB and URLs, providing flexibility in threat assessment.
- API Integration: Offers an API for automated submissions and integration with other security tools, facilitating streamlined workflows.
- Dynamic Analysis: Employs the Cuckoo sandbox for dynamic malware analysis, enabling in-depth examination of suspicious files.
- Statistical Insights: Provides real-time statistics on scanned files and detected threats, aiding in trend analysis and threat intelligence.
Primary Value:
VirusTotal enhances cybersecurity by offering a centralized platform for comprehensive malware detection and analysis. It addresses the limitations of individual antivirus solutions by aggregating multiple detection engines, thereby reducing false negatives and improving threat identification. This service is invaluable for security professionals, researchers, and organizations seeking to bolster their threat intelligence, validate suspicious files or URLs, and respond swiftly to potential security incidents.
9
Trellix Intelligent Virtual Execution (IVX)
3.8
(30)
Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.
10
Symantec Content Analysis and Sandboxing
4.6
(30)
Detect and block advanced threats that elude traditional analysis with multiple-layer inspection and customizable sandboxing
No Discussions for This Product Yet
Be the first to ask a question and get answers from real users and experts.
Start a discussion
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.



