Advanced Intrusion Detection

We accurately identify and block malware, dangerous user behavior and data exfiltrations that would otherwise go unnoticed.



Lower False Negatives

Signature-based IDS/IPS & antivirus solutions are becoming increasingly ineffective.

For example, we measure that an antivirus solution misses known malware from 20% to 50% of the time with respect to all its rivals combined. Things get even worse if we also count unknown malware that can only be detected through a sandbox.

Signature-based detection systems cannot detect and prevent today's leading causes of cyber security incidents. Unpredictable user behavior, bad passwords and social engineering attacks can only be detected using behavioral threat analysis.

Diverse threat intelligence
Our Network Antivirus system not only uses more than sixty (60+) antivirus solutions at once, but also uses a mix of proprietary, commercial and collaborative feeds to analyze the behavior of the content as it is executed/opened to determine whether it is well behaved.

Dynamic Ranking
When you deploy our technology, your enterprise becomes an integral part of our cloud-based correlation system. By anonymously sharing threat intelligence from multiple enterprises we can extract dangerous communication patterns that are strong predictors of a potential compromise. This information is then fed back to each customer in the form of dynamic IPS block rules.

Even More >



Lower False Positives

Security events are raw data NOT actionable information.

Traditional Network IDS software generates alerts by finding known threat patterns within a single TCP/UDP session. This usually results in a very high false positive rate. Important events are often missed due to the huge volume of false positive or low-priority network security events.

MetaFlows uses Multi-Session Correlation. Multi-session correlation is an evolution of dialog-based correlation first introduced by a revolutionary malware detection tool called BotHunter.

Multi-session correlation extends dialog based correlation by leveraging diverse threat intelligence that goes well beyond signature based IDS alerts. Simply put, it automatically connects the dots between (any) security alert involving a single internal host with multiple external hosts over time.

Even More >

The MSS network intrusion detection software runs on CentOS/RHEL 7, and therefore, can be deployed (1) on dedicated hardware, (2) as a virtual machine, or (3) in the Amazon EC2 cloud. The software scales with the hardware and can handle from a few Mbps to 10 Gbps. The software cost is determined by the amount of traffic it needs to monitor (measured in bps) and its features. Our software subscriptions are offered in three feature / performance tiers: Bronze, Silver, and Gold and can be purchased on monthly, annual and biannual subscription terms. Amazon EC2 hourly AMIs are billed directly by Amazon.

Go beyond compliance, improve your security operations.


Advanced Threat Hunting & Forensics

MetaFlows' network intrusion detection software provides indexed packet logging to easily reconstruct what happened in your network past. The time horizon is directly proportional to the storage to bandwidth ratio and can range from a few hours to a few weeks depending on the setup. The time horizon can be adjusted by sizing the storage capacity while leveraging our proprietary packet indexing technology to scale your forensic capabilities to a whole new level.

Take charge or your network. Shut down security threats with dynamic IPS policies updated every 12 hours.


Block Threats Without Impacting Reliability

Soft IPS is ground-breaking software-based Intrusion Prevention technology that shuts down threats with zero impact on performance and reliability. It uses powerful active response technology to block unwanted traffic (bots, spyware, P2P, etc.) and actively learns which flows need to be blocked by extracting invariants from your communication patterns.

Cost-effectively inspect your encrypted traffic without compromising security and reliability.


Passive SSL/TLS Interception

Passive SSL/TLS interception does not require a proxy, it is more reliable and more secure. Also the cost of passive SSL/TLS interception is significantly lower than traditional techniques because it does not require an inline device to continuously perform cryptographic operations in real time to first decrypt and then encrypt all traffic to inspect.

Cost-effective deployment options for both on-premise and the public cloud.


Deploy Anywhere

Our software was designed as an open system and can therefore be easily customized and integrated into any existing infrastructure. It can be installed in minutes on Linux CentOS or RedHat, VMware (Server/Player or ESX4), Amazon EC2 or Microsoft Azure supporting a variety of storage and monitoring configurations. We also provide cost-effective malware detection appliances optimally designed to scale from 50 Mbps to 10 Gbps.