Advanced Network Malware Detection

metaflows shield Multi-Session Analysis

Emerging trends like mobility, P2P applications, cloud-based services, and social media are giving us better access to information at the expense of security. Modern network malware can exploit these trends to bypass the network perimeter.

Today's cutting edge perimeter defense systems can prevent most intrusions by using advanced access control heuristics, real time threat feeds & content behavioral analysis. However once there is a compromise, malware can dangerously go unnoticed for quite a while because these techniques cannot detect communication behavior over multiple sessions over time. This is why MetaFlows' advanced malware detection technology continuously performs multi-session analysis. Rather than focusing on single events (like a traditional IDS/IPS), it produces incident reports containing multiple events related to the same threat. False positives are virtually eliminated letting security administrators focus on security events that really matter.

Play Video Compare to Other Solutions

Indexed Packet Logging

There are good reasons why it is important to proactively record all packets traversing a network. Without packet logging, incidents often lead to these familiar, unanswered questions: Did the user click on the link? Did the user log in? Did the server respond? What else did they download? Without packet logging, there is little to investigate and circumstantial evidence often leads to very uncertain conclusions.

MetaFlows provides an extensible full packet logging solution to search, reconstruct, render and analyze whatever was transmitted on a network. The time horizon is directly proportional to the storage to bandwidth ratio and can range from a few hours to a few weeks depending on the setup. The time horizon can be adjusted by sizing the storage hardware while leveraging our proprietary packet indexing technology to elevate forensic capabilities to a whole new level. Indexed packet logging provides an unprecedented level of network visibility essential to assessing the security of your network.

Learn More

Open Source Malware Detection Appliances

In order to reliably identify hidden threats, our network security monitoring software needs to perform several CPU intensive, deep packet analysis functions in real time. Dynamically executing content through sandboxes also requires plenty of CPU and RAM.

Fortunately, our network security monitoring software easily meets these processing requirements using open software, hardware, and virtualization standards. MetaFlows offers inexpensive, turn-key, malware detection appliances ranging in capacity from 50 Mbps to 10 Gbps. Importantly, you can also build your own appliances by simply downloading our software on Linux Centos or RHEL systems (physical or virtual). Our software was designed as an open system and can therefore be easily customized and integrated into any existing infrastructure. Start a free trial today on your own existing hardware!

Play Video Read Testimonials

Create Advanced Malware Detection Appliances Within Minutes

Passively analyze your network traffic to reliably detect and shut down malware that gets past your perimeter defense.

Our on-premise software plans support from 100Mbs to 10Gbps of sustained network inspection. Register here to download and run our software for a two week unlimited trial on your own hardware. Follow these instructions or watch the video.

For advanced IDS in the AWS cloud, simply launch and register our hourly AWS Marketplace instance and add these simple agents to the existing cloud assets you want to monitor (no reboot required).

Turn-key Malware Detection Appliances

MSS-1/4/8C (100Mbps-1Gbps)

1 Gbps Behavioral Network Security Monitoring Appliance

MSS-24C (1-3Gbps)

5 Gbps Behavioral Network Security Monitoring  Appliance

MSS-64C (3-7Gbps)

10 Gbps Behavioral Network Security Monitoring  Appliance

MSS-UTM-1C (50Mbps)

50 Mbps UTM Appliance

MetaFlows' network malware detection appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps. Contact us to learn more

Like what you see? Want to learn more about Malware Detection?
Start Now Schedule a Demo