Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

MetaDefender uses a variety of market-leading technologies that protect critical IT and OT systems. It also reduces the attack surface by detecting sophisticated file-borne threats such as advanced evasive malicious code, zero-day attacks and APTs (advanced persistant threats). MetaDefender integrates seamlessly with existing cybersecurity solutions on every layer of the infrastructure of your organization. MetaDefender's flexible deployment options, tailored to your specific use case and purpose-built, ensure that files entering, being saved on, or leaving your environment are secure--from your plant floor to your cloud. This solution uses a variety of technologies to assist your organization in developing a comprehensive strategy for threat prevention. MetaDefender protects your organization from advanced cybersecurity threats that are present in data originating from various sources, including the web, email, portable devices, and endpoints.

Description

REMnux® is a specialized Linux distribution designed for reverse-engineering and examining malicious software. This toolkit offers a well-organized selection of free tools developed by the community for analysts to utilize in their malware investigations, eliminating the need to individually locate, set up, and configure each tool. For easy access, users can download the REMnux virtual machine in OVA format and import it into their hypervisor environment. Additionally, it can be installed directly on a dedicated host or integrated into an existing system that runs a compatible version of Ubuntu. The toolkit also includes Docker images for widely-used malware analysis tools, allowing them to operate as containers without the necessity of direct installation on the host system. Furthermore, users have the option to run the entire REMnux distribution as a container, enhancing flexibility in various environments. For comprehensive guidance on installation, usage, and how to contribute to REMnux, along with detailed information about the tools in the toolkit, users should refer to the official REMnux documentation site, which serves as a valuable resource for both new and experienced analysts alike.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Admin By Request
Blink
Docker
F5 BIG-IP SSL Orchestrator
Kasm Workspaces
MetaAccess
MetaDefender Kiosk
MetaDefender OT Security
MetaDefender Vault
SURF Security
SafeConnect NAC
Security Score

Integrations

Admin By Request
Blink
Docker
F5 BIG-IP SSL Orchestrator
Kasm Workspaces
MetaAccess
MetaDefender Kiosk
MetaDefender OT Security
MetaDefender Vault
SURF Security
SafeConnect NAC
Security Score

Pricing Details

$0
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OPSWAT

Founded

2002

Country

United States

Website

www.opswat.com

Vendor Details

Company Name

REMnux

Founded

2010

Website

remnux.org

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Alternatives

GateScanner Reviews

GateScanner

Sasa Software

Alternatives

FileWall Reviews

FileWall

Odix
FileAlyzer Reviews

FileAlyzer

Spybot
Threat.Zone Reviews

Threat.Zone

Malwation