You will be amazed what you can find out about your network

Shut down malware that sneaks in, detect dangerous user behavior & gain extreme visibility of your network.

UNCOVERING DATA BREACHES

Is your network infected?

Weekly Stats

4.35

Packet Analyzed

626

Security Warnings

260K

Malware Found

1,200

Inbound Content Scanned

Real-time Malware Detection

These are the locations where possible Malware communication is currently originating from. Sometimes you will see a red dot signifying a confirmed source that succesfully compromised a host.

THE METAFLOWS SECURITY SYSTEM

Main Features

Advanced Malware Detection (SaaS)

1534

Compromises detected in last 24 hours

Reliably Detect Malware Behavior inside your network perimeter.

LEARN MORE

Network IDS IPS for the cloud

1534

Security events in last 24 hours

Also protect your AWS assets as if they were in your LAN.

LEARN MORE

Full Packet Logging & File Carving

1534

Packets analyzed in last 24 hours

Record and search for anything that goes through your network.

LEARN MORE

Network Antivirus & Sandboxing

1534

Files analyzed in last 24 hours

Scan and validate all incoming content in real time.

LEARN MORE

THE NEED FOR

Advanced Network Malware Detection and Prevention

The MetaFlows malware detection and prevention system records, scans and validates all inbound Internet content while monitoring outbound communication patterns to uncover active infections and data breaches that cannot be prevented by network perimeter defenses

The Internet Community Comes to Your Defense

Any single threat feed is insufficient; it can only detect at most 20% of the known threats. That is why we use 55+ antivirus solutions at once and combine threat intelligence from Emerging Threats, VirusTotal, OSSEC, Trustwave, Cuckoo, YARA, Web of Trust and more.

MSS-1/4/8C (<1GBPS)

MSS-64C (3-7GBPS)

MSS-24C (1-3GBPS)

MSS-UTM-1C (50MBPS)

Malware Detection Appliances

MetaFlows’ malware detection appliances are based on robust open standards that quickly integrate in any existing infrastructure. They are custom-built with the best hardware components available today to provide reliable and cost-effective packet processing from 50 Mbps to 10 Gbps.

HOW TO GET OUR SOFTWARE

Build your own advanced malware detection appliances within minutes

PASSIVELY ANALYZE NETWORK TRAFFIC TO:
  • Scan all content entering your network with 55+ antivirus software solutions at once
  • Sandbox unknown content to discover new threats
  • Reliably detect and shut down malware that gets passed your perimeter defense
  • Detect lateral moves and data exfiltration attempts
  • Pinpoint and prevent potential network security threats
  • Proactively log all IP packets for forensic investigations
  • Our software security solution support from 100Mbs to 10Gbps of sustained network inspection.
  • To try our technology simply register here to start a two-week unlimited trial.
MINIMUM HARDWARE REQUIREMENTS ARE:
  • 4GB RAM or 2GB RAM/core (whichever is greater)
  • At least two physical Ethernet interfaces (one for management and one for passive traffic analysis)
  • At least 100GB of disk space

SUPPORTED PLATFORMS

SCHEDULE A

Live Demonstration

Interact with an expert security analyst as he uncovers

previously unknown, compromised machines in a live

university network!