MetaDefender ICAP Server

Advanced Threat Prevention for Network Traffic and Storage Devices

MetaDefender ICAP Server uses the Internet Content Adaptation Protocol (ICAP) to integrate with network appliances to protect against advanced threats in network traffic and storage devices, using industry-leading multi-scanning, vulnerability scanning, and data sanitization, also known as content disarm & reconstruction (CDR), vulnerability assessment and data loss prevention (DLP) technologies.


  • Protect Reverse Proxies

    Enhance security by integrating MetaDefender ICAP Server with reverse proxies such as load balancers, web application firewalls and application delivery controllers. Using ICAP, all web applications sitting behind the network appliance are protected. Read more about how to use MetaDefender with F5® appliances

  • Protect Forward Proxies

    MetaDefender ICAP Server prevents the entry of document-based malware and exploits coming from the web in forward proxy mode, as well as providing visibility into the vulnerability levels of installers and executable software applications your users are downloading. Read more about how to use MetaDefender with Blue Coat® Proxy SG and Squid Proxy.

  • Protect Data on Storage Devices

    Protect critical data on storage devices by integrating MetaDefender’s advanced threat detection and prevention of known and unknown threats, as well as data loss prevention (DLP) for preventing sensitive information from being copied onto storage devices

  • Enhance Security Appliances

    Add MetaDefender’s advanced threat protection to Intrusion Prevention Systems and Next Generation Firewalls that support ICAP, such as Check Point, Cisco and others. Read more about how to use MetaDefender ICAP Server with Fortinet FortiGate Firewall.

"We've used OPSWAT technology for several years, in multiple integrations and in various products, [and] their reputation in the industry has just been stellar over [that] time. I've worked in the industry for 30 years, and OPSWAT [is] a company I've always trusted and worked well with."
Joe Peck
Senior Director of Product Management, F5®


Data Sanitization (CDR)

Sanitize over 30 common file types, and rebuild each file ensuring full usability with safe content.


Leverage 30+ anti-malware engines using signatures, heuristics, and machine learning technology for the highest and earliest detection of known and unknown threats.

Vulnerability Assessment

Detect vulnerabilities in more than 20,000 software applications using over 1 billion hashes.

Data Loss Prevention

Content-check 30+ common file types for sensitive information before they are transferred.

High Performance

Scalable for any traffic volume with built-in high-performance architecture.

Customisable Policies

Configure security rules based on host, client or any HTTP header.

Role Based Configuration

Active Directory and LDAP group-based administrative roles.