MetaFlows Solution Partners
MetaFlows customers benefit from a growing ecosystem of solution partnerships focused on adoption of Open Sensor Technology™. The open, modular architecture of the MetaFlows solution creates a uniquely extensible platform with virtually unlimited integration capabilities, including – intrusion detection (IDS), intrusion prevention (IPS), flow analysis, log management, security information & event management (SIEM), vulnerability scanning and many additional capabilities as future product features. Companies interested in becoming a Metaflows Solution Partner should not hesitate to contact us using the form – Here.
Emerging Threats is a community-based grant-funded Security Research Project. Our focus is Network and Electronic Security related intelligence gathering, analysis, research and resulting data distribution. Collaboration with similar projects and tools through MetaFlows has enabled Emerging Threats to become a centralized repository and distribution point of defensive security tools, research, and data. Emerging Threats (formerly Bleeding Snort and Bleeding Threats) was founded in 2003 by Matt Jonkman.The Emerging Threats mission is to best use all of the data available and producible then combining these resources. For example, sandboxing malware samples can yield a great deal of real-time and long term threat data, but often it is unused or not made available in a manner that many tools and users may benefit. We will make available the feeds and tools to best use the data we generate, and data from any other project that is willing to contribute.
Cyber-TA is an initiative to accelerate the ability of organizations to defend against Internet-scale threats by delivering technology that will enable the next-generation of privacy-preserving digital threat analysis centers. These centers must be fully automatic, scalable to alert volumes and data sources that characterize attack phenomena across millions of IP addresses, and higher fidelity in their ability to recognize attack commonalities, prioritize, and isolate the most critical threats. Cyber-TA brings together leading researchers in large-scale network intrusion defenses with leaders from the information privacy community to develop next-generation wide-area collaborative defense technologies that maximally balance the needs for contributor privacy with the need for rich-content data to drive new threat detection and mitigation systems.
Cybersift’s range of products enable capturing and feeding of critical, “must capture” packets and flows to applications using field proven technology up to core network speeds (n x 10 Gbps). The patented architecture of the Cybersift product range performs dynamic, parallel IP processing across high performance FPGA’s supporting 15,000 concurrent rules or patterns across 8,000,000 traffic flows in a 100% deterministic manner. Based on a breakthrough security hardware innovation called Dynamic Parallel Inspection (DPI), the Cybersift range of Sifter products deliver unprecedented 10 Gigabit line rate security capabilities with the lowest latency, highest reliability and most uniquely flexible hardware-based engine. The Sifter represents the next generation of scalable, high performance security solutions offering the flexibility of an open architecture for the dynamic and changing nature of IDS/IPS, Firewall, DDoS Protection, Anti-Spam, Lawful Intercept and Data Leak Prevention.
Force10 Networks’ industry leading product scalability, reliability and application awareness ensures cost-effective delivery of content from the enterprise or converged network to the mobile business user or consumer. Force10 sells largely to large enterprises and communications services providers; other customers include educational institutions and research labs. Today, customers including leading enterprise data centers, global wireless and wireline service providers, top supercomputing environments and iconic Internet brands have derived significant value from Force10’s solutions. More than 60,000 cell sites today are using Force10 wireless backhaul solutions worldwide; while more than 1,300 customers have deployed its Ethernet switching/routing, metro edge and converged access solutions.
Bivio has significantly reduced the time, effort and resources required to identify, source and deploy open source applications for network monitoring, analysis and cyber security solutions. Bivio’s Certified Application Library makes available to IT Managers instant access to market leading 3rd Party and open source applications, including SNORT®, Bro, YAF and SiLK, certified on the Bivio 7000 Deep Packet Inspection Applications Platforms. With each application Bivio includes an RPM package of the software files, documents and configuration files native to the open source software as well as application profiles and initialization scripts to simplify and ease implementation.