Metaflows Shield icon Evolve Your Network Security Play Video

Behavioral Malware Detection protects your Enterprise from the INSIDE

Mobile devices, P2P applications and cloud-based services are inexorably dissolving your security perimeter whether you like it or not. Traditional perimeter defense systems (like NG-firewalls) are becoming irrelevant; the proof is in the increase in data breaches (Target, Home Depot, Dairy Queen, etc.)

In an era of dissolving network perimeters, enterprises badly need a solution that also protects the network from the inside out. Unlike perimeter security systems, MetaFlows continuously performs multi-session traffic analysis looking for multiple red flags in the behavior of hosts on the internal network. As cyber-threats are detected (regardless of how they get in), they are shut down and reported through our browser-based security console. Mind your perimeter but please start monitoring the behavior of your internal hosts now!

Compare Us to Other Solutions
Join The SaaS Revolution Play Video

Defend your Enterprise with collaborative Internet intelligence feeds

Traditional cyber-security defenses are asymmetric; the attackers collaborate globally while security vendors struggle independently. MetaFlows disrupts this trend by using multiple, collaborative network intelligence sources to defend your Enterprise (SourceFire, Emerging Threats, Virus Total, OSSEC, Nessus, Mod_security, Cuckoo, Yara, etc.)

For example, our Network Antivirus system not only uses more than 50 antivirus solutions at once, but also uses a mix of proprietary and open source feeds to analyze the behavior of the content as it is executed/opened to determine whether it is well behaved. When you deploy MetaFlows you are really deploying defenses from the entire Internet community, and not a single vendor. Our SaaS architecture transparently manages all intelligence updates requiring zero software maintenance!

Learn More
Easily Defeat The Evil In Your Network Play Video

Network Security Appliances based on open standards simplify your life

In order to reliably identify hidden threats, our multifunctional software needs to perform several CPU-intensive, deep-packet inspection functions in real time. Dynamically executing content through sandboxes also requires a lot of CPU and RAM. Fortunately, our software easily meets these processing requirements using open software, hardware, and virtualization standards.

MetaFlows offers inexpensive, turn-key, network security appliances ranging in capacity from 50 Mbps to 10 Gbps. Importantly, you can also build your own network security appliances by simply downloading our software on Linux Centos 6.x or REHL systems (physical or virtual). Our software was designed as an open system and can therefore be easily customized and integrated in any existing infrastructure. Start a free trial today on your own existing hardware!

Read Testimonials

Metaflows Shield icon Malware Detection Appliances

MetaFlows' security appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps. Contact us to learn more.


20 Mbps UTM Appliance


5 Gbps Behavioral Malware Detection Appliance


10 Gbps Behavioral Malware Detection Appliance


10 Gbps Behavioral Malware Detection Appliance

Metaflows Shield icon Malware Detection Software

Register here, then build your Malware detection appliance using one of the links below.
Watch a Video on how to start a trial or contact us to learn more.

Here are some of our customers:

Like what you see? Want to learn more about Malware Detection?
Start Free 14-Day Trial Schedule a Demo

Follow us
MetaFlows on Google GroupsMetaFlows on LinkedIn