Customer Testimonials

James Macdonnell, California State University San Bernardino

California State University San Bernardino logo

"Metaflows is more effective as compared to our existing intrusion detection infrastructure because it lets us more quickly identify and correlate relevant alerts."

"Metaflows is more effective as compared to our existing intrusion detection infrastructure because it lets us more quickly identify and correlate relevant alerts."

"Metaflows made our intrusion detection more accessible and requires less analyst training. As an example, where at one time IDS tuning required command-line skills, this is now available through a simpler and less error-prone web interface."

Rizlan Shah Azlan, Monash University

I have been impressed by how responsive the team at Metaflows has been even when we are nine time zones away.

"I came across Metaflows when I was looking for providing a cost effective network monitoring solution for the Sunway campus. I have been impressed by how responsive the team at Metaflows has been even when we are nine time zones away. It has been a wonderful experience working with the Metaflows team."

Our service, flexibility, features, and cost efficiency are so great that we have close to a 100% customer-retention rate. Here is a small sample of what our customers say about us.

Mark Maunu, Cubic Corporation

Cubic Corporation logo

Metaflows is a simple yet robust system to get your IDS sensors under control and start finding the 'evil' on your network before it has a chance to wreak havoc.

"Deploying an IDS system and monitoring your network for anomalies could not be easier with the Metaflows system. The web based sensor setup quickly takes the guesswork out of manual Snort configuration by giving the user a quick and easy set of questions to define your network and what you want to protect. Once you complete the form your unique sensor is created in the Metaflows cloud and you are presented with the option to download the sensor as a vmware virtual machine or tarball file to install on physical hardware. You will be up and running with a working Snort sensor with the latest rule sets in under an hour. From here on all of your management of Metaflows and your sensors are done through a secure web connection. This couldn't be easier."

"Once up and running, choose the rule sets you want from Emerging Threats or add your Sourcefire oinkcode to run those rules. You can also quickly view the traffic that is flowing across your network and make decisions as to whether the traffic is hostile or benign. Then you can tune your rule set based on the traffic you see to help you find false positive alerts and modify the ruleset to exclude them."

"But the best features are the inclusion of Bothunter tool and the Metaflows algorithm which ranks Snort alerts according to severity. These tools quickly let you know which Snort alerts are the most important to view and which of your hosts are most likely infected with bots or malware. We have used these tools to quickly identify and shut down these infected hosts."

"Metaflows is a simple yet robust system to get your IDS sensors under control and start finding the 'evil' on your network before it has a chance to wreak havoc."

Eric Pavlak, Non-Profit Technology Assurance Group

After rigorous search and careful consideration, Metaflows is the best tool for the job.

"I have at my disposal an array of security-focused tools with which to enforce various aspects of enterprise security. Encryption, Antivirus, firewalls, etc. These tools, when configured and functioning properly each provide their own layer of security, and the combination of security layers provides the best defense. Despite this approach, the reality remains that organizations can fully comply with the laws that drive security compliance and yet still be vulnerable, if not compromised."

"Intrusion Detection provides an independent awareness of the nature of network traffic flow, and quite possibly the greatest level of assurance that security systems are configured and operating properly. I believe Ronald Reagan's use of the phrase 'Trust but verify' succinctly describes the reason for IDS, and that enterprise security without verification is quite possibly the most undeserved and misplaced trust one can give. It is tantamount to complacency."

"It is my experience that IDS traditionally comes in two flavors: 'Roll-your-own' (Snort) and 'obscenely expensive'. While Snort is venerable, it does require its own measure of technical expertise to deploy properly; and as is the case with many open-source products, responsibility for its proper functioning is not underwritten by anyone. They are essentially provided 'as-is' and without warranty, leaving the onus solely with the end-user to ensure interoperability and efficacy."

"I have a distinct set of criteria necessary to adopt a product:

  • Affordability - There is a delicate balance between cost and justification. While there are other competing products out there, it remains clear that organizations, faced with tough fiscal decisions, will simply not implement these solutions if they are not perceived as affordable.
  • Reporting - While secondary to affordability, my opinion is that it is pointless to implement any solution that does not have reporting capability. As the field of security compliance continues to grow, documenting evidence of compliance will play an ever-increasing role.
  • Support - In my opinion, this distinguishes an enterprise-ready product from one geared for the hobbyist. Additionally, in legal parlance: without the exchange of money, you have no reasonable expectation to product performance. Colloquially: 'you get what you pay for."

"After a rigorous search and careful consideration, Metaflows is the best tool for the job."

Join these happy customers. Try Metaflows today.
Start Free 14-Day Trial Schedule a Demo

Follow us
MetaFlows on Google GroupsMetaFlows on LinkedIn

Learn what we are doing
  • test