License Details
Threat Prevention
Flexible file processing and with multiple threat detection, lookup and prevention technologies available in three different tiers to meet your service and volume requirements.
Standard
Geared towards personal users and very small startups that do not have a high volume of files to scan.
Professional
Offers a general-purpose license tailored for most small to mid-sized organizations.
Enterprise
Designed for large organizations in search of a robust cybersecurity solution and the lowest scan time and availability SLAs.
Metascanâ„¢ Multiscanning | |||
Deep CDRâ„¢ File Sanitization | |||
Proactive DLPâ„¢ Sensitive Data Detection and Redaction | |||
Archive Extraction | |||
File Type Verification |
API Calls (starting at) | 1,000 / Daily | 1,000 / Daily | 1,000 / Daily or 30,000 Monthly |
Number of Antivirus Engines | 10 | 15 | 20+ |
File Size Limit | 140 MB | 256 MB | 1 GB+ |
Throttling (req/min) | 75 | 150 | 500 |
Max files in archive | 500 | 10,000 | 50,000 |
Archive recursion level | 5 | 25 | 50 |
AhnLab | |||
Avira | |||
BitDefender | |||
ClamAV | |||
K7 | |||
Lionic | |||
Quick Heal | |||
RocketCyber | |||
TACHYON | |||
Varist | |||
CMC | |||
Ikarus | |||
Webroot SMD | |||
Xvirus Personal Guard | |||
Zillya! | |||
BKAV Pro! | |||
Comodo | |||
Emsisoft | |||
Filseclab | |||
McAfee | |||
NanoAV | |||
Vir.IT eXplorer | |||
Vir.IT ML |
Availability SLA | 99.5% | 99.5% | 99.9% |
Response time SLA | 8 seconds p50 500ms API calls p50 | 8 seconds p75 500ms API calls p75 | 8 seconds p90 500ms API calls p90 |
RTO | 24 hour | 12 hour | 4 hour |
RPO | 24 hour | 12 hour | 4 hour |
Private Scanning | |||
Private Processing | |||
End to End Encryption | |||
IP Range Restrictions | |||
mTLS | |||
Customer Provided IDP |
Monthly Limits | |||
Usage Buffer | 20% Over Without Fee | 50% Over Without Fee | |
Organizations | |||
Reporting | |||
Notifications/Alerts | |||
Custom Domain |
Additional API Tools
Flexible file processing and with multiple threat detection, lookup and prevention technologies available in three different tiers to meet your service and volume requirements.
Cloud Sandbox
Expand the malware detection and analysis capabilities with adaptive threat analysis.
Reputation
Leverage real-time malware data collected by from all around the world.
Threat Intelligence
Perform threat hunting and detect unknown threats.
Execute files on multiple operating systems | |||
Automated interpretation of malware behavior | |||
Extract Indicators of Compromise (IOCs) from a wide range of executables, documents, scripts, and URLs | |||
Emulates 90%+ of highly obfuscated state-of-the-art macro malware (VBA), VBS, PowerShell, Jscript, MSHTA, XSL, WSF | |||
Integrates with YARA, MITRE ATT&CK framework and more | |||
File Size Limit | 256 | ||
Retrieve scan reports using a file hash | |||
Scan IP addresses, URLs, and domains | |||
File metadata lookup | |||
Pattern search (expression search) intelligence data that focuses on exact matches of predefined conditions | |||
Similarity search techniques aim to identify patterns or indicators resemble known threats or Indicators of Compromise (IOCs) |
| API Calls (starting at) | 1,000 /Daily | 25,000 /Daily | 1,000 /Daily |
FAQ