Data Security at the Highest Level with Metadefender Managed File Transfer – MFT (former Metadefender Vault).

In today’s world, where data security is becoming increasingly important, companies must look to the latest technologies to protect their information. One tool that offers the highest level of data security is Metadefender Managed File Transfer – MFT

Table of Contents:

  1. Metadefender MFT: What is it?
  2. How does Metadefender MFT work?
  3. Metadefender MFT features and capabilities
  4. Benefits of using Metadefender MFT
  5. Examples of use
  6. Integration with other security tools
  7. Frequently asked questions

Metadefender MFT: What is it?

Metadefender MFT is an advanced tool developed by OPSWAT that enables companies to securely store and manage their data at the highest level. The platform offers advanced features, enabling organizations to effectively protect their information, regardless of its type or size. Metadefender MFT not only provides secure data storage, but also provides tools to manage it transparently and efficiently. As a result, companies can rest assured that their data is protected according to the highest security standards, which translates into increased customer confidence and compliance with data protection regulations.

How does Metadefender MFT work?

Metadefender MFT works on the principle of encryption and isolation of data, which provides it with the highest level of protection. As a result, even in the event of an attack by cyber criminals, the data stored in Metadefender MFT is safe and inaccessible to unauthorized persons. The encryption mechanisms used by the platform make the data unreadable to unauthorized parties even if intercepted. In addition, data isolation prevents data manipulation or theft, providing companies with peace of mind that their information is fully protected. Metadefender MFT is an indispensable tool for companies concerned about the security of their data and wanting to avoid potential cyber threats.

Features and capabilities

Preventing zero-day attacks

Avoid zero-day attacks and protect your organization from false negatives through a variety of measures. Block all new files within a specified quarantine time, continuously scan them with multiple antivirus engines, and implement role-based access rules to reduce risk. Track and record processing and detection activities in real time.

Access control

Implements workflow processes that require authentication and restricts access and file sharing based on user role and task type. Specify a list of authorized supervisors to take specific actions, such as blocking access to files not previously approved. Enforce complex approval procedures for highly confidential data.

User management

Improves user categorization and management through a unified view. Differentiate between Active Directory service users, guests and local users, which provides flexibility for sharing files with external parties and ensures security by temporarily disabling guest access. Easily filter and synchronize users with Active Directory and manage license issues.


Utilize a variety of configuration options and receive email notifications for various activities, providing full visibility into workflows and quick response to potential threats.

Multi-tasking solution

MetaDefender MFT integrates with MetaDefender Kiosk to support portable media. Working with MetaDefender Email Gateway Security, all attachments can be replaced with links to purged files stored in the MFT. And direct integration with Microsoft Active Directory speeds up user adoption. Integrate via Rest API to process large data sets and repository to repository, providing secure file transfer across multiple environments.

Audit trail

Records all user actions (e.g., adding and removing users, uploading files, deleting, sharing, locking and purging) to meet corporate compliance requirements. In addition, store a history of all processed files for archiving purposes.

Multiple storage options

Choose from a variety of storage locations for maximum flexibility, including local, network, S3 or other S3-compatible storage. Make sure to keep the original files separate from the cleaned ones to increase data security. Restrict access to originals for added protection.

List of trusted networks

It secures access to trusted networks by applying restrictions to users logging in from other IP addresses, which will provide additional levels of security.

Benefits of Using Metadefender MFT

Highest level of data security

Metadefender MFT provides unparalleled data protection with advanced encryption and isolation mechanisms that minimize the risk of security breaches.

Real-time data encryption

The platform enables real-time data encryption, ensuring that information is secure even while it is being transmitted or stored.

Isolate data from unauthorized access

By isolating data, Metadefender MFT prevents unauthorized access to information, minimizing the risk of theft or tampering.

Ability to ensure compliance with data protection legislation

The platform enables companies to comply with current data protection laws, which is key to avoiding fines and penalties.


Examples of Using Metadefender MFT.

Storage of Medical Data

The company is using Metadefender MFT to store its patients’ medical data. As a result, the information is secure and protected from unauthorized access, ensuring data security at the highest level.

Secure Storage of Financial Documents

Companies use Metadefender MFT to securely store their financial documents. In this way, payment, invoice and billing information is protected from theft and unauthorized access.

Integration of Metadefender MFT with Other Security Tools.

Metadefender MFT is a comprehensive tool that can be seamlessly integrated with Metadefender Core.

MetaDefender MFT provides a secure way to transfer and store files on networks, guaranteeing limited access to them. With full integration with MetaDefender Core, you can be sure that your organization only has access to files that do not pose a threat.

MetaDefender MFT offers the following features:

Work with MetaDefender Core to establish criteria for secure file access:

  • Scans files for malware using multiple antimalware engines (the number of antimalware engines depends on the MetaDefender Core package)
  • Preventing the spread of epidemics
  • Cleaning files containing unknown threats, such as MS Office documents, PDF files, images and others
  • Verify the accuracy and consistency of the file format
  • Control of permissions for specific file types
  • File gap analysis
  • Archive bomb detection
  • Ensure high availability with multiple Core servers

In addition, MetaDefender MFT offers:

  • Secure sharing of files within the organization by users
  • Ability to share files externally, with external users
  • Supervisor approval process
  • Advanced authentication and enhanced security
  • File lifecycle management
  • Administrative overview of files transferred via MetaDefender MFT
  • Active Directory integration for one or more domains
  • Role-based access (Administrator, Registered User, Guest)
  • Full audit trail for each file, with information about the author, upload and download time
  • Email notifications regarding file operations and other administrative tasks
  • Easy setup with built-in web server and database
  • Automatic and according to preset cycles download and transfer of files from and to file systems (FTP, etc…), without user involvement
  • Cloud-based installation capability

Frequently asked questions

1. is Metadefender MFT suitable for small businesses?

Yes, Metadefender MFT is suitable for companies of all sizes, including small businesses that are looking for effective tools to ensure the highest level of data security.

2 What are the main features of Metadefender MFT?

Metadefender MFT offers a number of features, including data encryption, isolation from unauthorized access, and the ability to comply with data protection laws.

4 What are the main advantages of using Metadefender MFT?

The main advantages are the highest level of data security, easy integration with existing IT systems, and the ability to ensure compliance with data protection legislation.

Leave a Reply

Your email address will not be published. Required fields are marked *