Download our Intrusion Detection Software to Create Advanced Malware Detection Appliances within Minutes

Passively analyze your network traffic to reliably detect and shut down malware that gets past your perimeter defense.

Our on-premise software plans support from 100Mbs to 10Gbps of sustained network inspection. Register here to donwload and run our software for a two week unlimited trial on your own hardware. Follow these instrucions or watch the video.

For advanced IDS in the AWS cloud, simply launch and register our hourly AWS Marketplace instance and add these simple agents to the existing cloud assets you want to monitor (no reboot required).

Turn-key Malware Detection Appliances

MSS-1/4/8C (100Mbps-1Gbps)

5 Gbps Behavioral Network Security Monitoring Appliance

MSS-24C (1-3Gbps)

10 Gbps Behavioral Network Security Monitoring  Appliance

MSS-64C (3-7Gbps)

10 Gbps Behavioral Network Security Monitoring  Appliance

MSS-UTM-1C (50Mbps)

20 Mbps UTM Appliance

MetaFlows' network malware detection appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps. Contact us to learn more

Advanced Intrusion Detection Software Play Video

metaflows shield Advanced Multi-Session Analysis

Emerging Internet trends like mobility, P2P applications, cloud-based services, and social media are giving us better access to information at the expense of security. Modern network malware can exploit these trends to evade traditional network perimeter defense systems (firewalls, Intrusion Prevention Systems (IPS), email scanning appliances, etc) and compromise your network.

The underlying problem is that today's perimeter defense systems assume your network is clean and focus exclusively on preventing threats from getting in. MetaFlows' advanced malware protection software instead assumes that your internal assets might already be compromised and continuously performs multi-functional, multi-session network intrusion detection analysis. As cyber security threats are detected (regardless of how they got in), they are shut down and reported through our browser-based security management console.

Play Video Compare to Other Solutions

Real Time Collaborative Intelligence Feeds

Traditional cyber-security defenses are myopic and asymmetric; the attackers collaborate globally while the security vendors struggle independently. MetaFlows disrupts this trend by using multiple collaborative network intrusion detection feeds to defend your enterprise.

Our malware detection appliances use real time feeds from: Emerging Threats, VirusTotal, OSSEC, Trustwave, Cuckoo, YARA and Web of Trust. For example, our Network Antivirus system not only uses more than fifty (50) antivirus solutions at once, but also uses a mix of proprietary, commercial and open source feeds to analyze the behavior of the content as it is executed/opened to determine whether it is well behaved. When you deploy MetaFlows you are really deploying malware defense from the entire Internet community, not a single vendor. Our SaaS architecture transparently manages all intelligence updates requiring zero software maintenance!

Play Video Learn More

Open Source Malware Detection Appliances

In order to reliably identify hidden threats, our multifunctional software needs to perform several CPU intensive, deep packet analysis functions in real time. Dynamically executing content through sandboxes also requires plenty of CPU and RAM.

Fortunately, our network security monitoring software easily meets these processing requirements using open software, hardware, and virtualization standards. MetaFlows offers inexpensive, turn-key, malware detection appliances ranging in capacity from 50 Mbps to 10 Gbps. Importantly, you can also build your own appliances by simply downloading our software on Linux Centos or REHL systems (physical or virtual). Our software was designed as an open system and can therefore be easily customized and integrated into any existing infrastructure. Start a free trial today on your own existing hardware!

Play Video Read Testimonials
Like what you see? Want to learn more about Malware Detection?
Start Free 14-Day Trial Schedule Demo