Your Network security perimeter is being dissolved by inexorable Internet trends like Mobility, P2P applications, cloud-based services, and social media. Traditional perimeter defense systems, such as NG-firewalls, are becoming irrelevant; the proof is in the relentless increase in data breaches: Target, Home Depot, Sony, and many others.What can I do about it?
In an era of dissolving network security perimeters, enterprises badly need a solution for network intrusion detection from the inside out. Unlike perimeter security systems, MetaFlows continuously performs multi-session intrusion detection analysis looking for multiple red flags in the behavior of hosts on the internal network. As cyber security threats are detected (regardless of how they get in), they are shut down and reported through our browser-based security console. Mind your perimeter but please start monitoring the behavior of your internal hosts now!Play Video Compare to Other Solutions
Traditional cyber-security defenses are myopic and asymmetric; the attackers collaborate globally while the security vendors struggle independently. MetaFlows disrupts this trend by using multiple collaborative network intrusion detection feeds to defend your Enterprise.What does this mean in practice?
Our Intrusion Detection System uses real time feeds from: Emerging Threats, Virustotal, OSSEC, TrustWave, Cuckoo, Yara and Web Of Trust. For example, our Network Antivirus system not only uses more than 50 antivirus solutions at once, but also uses a mix of proprietary, commercial and open source feeds to analyze the behavior of the content as it is executed/opened to determine whether it is well behaved. When you deploy MetaFlows you are really deploying malware defense from the entire Internet community, and not a single vendor. Our SaaS architecture transparently manages all intelligence updates requiring zero software maintenance!Play Video Learn More
In order to reliably identify hidden threats, our multifunctional software needs to perform several CPU intensive, deep packet analysis functions in real time. Dynamically executing content through sandboxes also requires plenty of CPU and RAM.Ok, so what?
Fortunately, our intrusion detection software easily meets these processing requirements using open software, hardware, and virtualization standards. MetaFlows offers inexpensive, turn-key, network security appliances ranging in capacity from 50 Mbps to 10 Gbps. Importantly, you can also build your own network security appliances by simply downloading our software on Linux Centos or REHL systems (physical or virtual). Our software was designed as an open system and can therefore be easily customized and integrated into any existing infrastructure. Start a free trial today on your own existing hardware!Play Video Read Testimonials
MetaFlows' network security appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps. Contact us to learn more