Advanced Network Intrusion Detection

Dangerous user behavior and phishing attacks cannot be prevented by network perimeter defenses and often lead to compromises. MetaFlows' advanced network intrusion detection technology is designed to reliably uncover and shut down active infections and data breaches by analyzing the communication patterns of your internal assets. It also continuously scans incoming content for both known and unknown malware while performing full packet capture of all communications.

Shut down malware that sneaks in, detect dangerous user behavior & gain extreme visibility of your network.

UNCOVERING DATA BREACHES

Is your network infected?

Weekly Stats

4.35

Packet Analyzed

626

Security Warnings

260K

Malware Found

1,200

Inbound Content Scanned

Real-time Malware Detection

These are the locations where possible Malware communication is currently originating from. Sometimes you will see a red dot signifying a confirmed source that successfully compromised a host.

THE METAFLOWS SECURITY SYSTEM

Main Features

Advanced Malware Detection (SaaS)

1534

Compromises detected in last 24 hours

Reduce false positives and reliably detect malware behavior inside your network perimeter.

LEARN MORE

Network IDS IPS for the cloud

1534

Security events in last 24 hours

Also protect your AWS assets as if they were in your LAN.

LEARN MORE

Full Packet Capture & File Carving

1534

Packets analyzed in last 24 hours

Record and search for anything that goes through your network.

LEARN MORE

Network Antivirus & Sandboxing

1534

Files analyzed in last 24 hours

Scan and validate all incoming content in real time.

LEARN MORE

THE NEED FOR

Advanced Intrusion Detection Software

Single IDS events are rarely useful without a context and often reported in high volume without an explanation of what they mean. Our patented technology, instead, automatically generates incident reports comprised of multiple inter-dependent (IDS and other) events. Rather than only providing isolated single-session events, incident reports give you the big picture with links to the underlying event data that matters as well as the complete packet capture of the incident. Using our technology, you will be amazed what you can find out about your network.

The Internet Community Comes to Your Defense

Any single threat feed is insufficient and leads to false negatives (something bad should have been detected). For example, we measured the average single antivirus solution detection rate at 20% of the known threats. That is why we use 55+ antivirus solutions at once and perform behavioral analysis of threat intelligence from Emerging Threats, VirusTotal, OSSEC, Trustwave, Cuckoo, YARA, Web of Trust and more.

MSS-1/4/8C (<1GBPS)

MSS-64C (3-7GBPS)

MSS-24C (1-3GBPS)

MSS-UTM-1C (50MBPS)

Turn-key Intrusion Detection Appliances

MetaFlows’ intrusion detection appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps.

HOW TO GET OUR SOFTWARE

Build your own advanced intrusion detection appliances within minutes

PASSIVELY ANALYZE NETWORK TRAFFIC TO:
  • Scan all content entering your network with 55+ antivirus software solutions at once
  • Sandbox unknown content to discover new threats
  • Reliably detect and shut down malware that gets passed your perimeter defense
  • Detect lateral moves and data exfiltration attempts
  • Pinpoint and prevent potential network security threats
  • Proactively log all IP packets for forensic investigations
  • Scale from 100Mbs to 10Gbps of sustained network inspection.
MINIMUM HARDWARE REQUIREMENTS ARE:
  • 4GB RAM or 2GB RAM/core (whichever is greater)
  • At least two physical Ethernet interfaces (one for management and one for passive traffic analysis)
  • At least 100GB of disk space

SUPPORTED PLATFORMS

SCHEDULE A

Live Demonstration

Interact with an expert security analyst as he uncovers

previously unknown, compromised machines in a live

university network!