Multi-functional, multi-session behavioral detection that reliably finds and shuts down malware hidden in your network
Unlike traditional IDS systems that rely on single-source intelligence and individual session analysis, MetaFlows uses multiple collaborative intelligence sources and multi-session behavioral detection
This unique multi-functional, multi-session approach simultaneously lowers both false positive and false negative rates. The result is improved detection accuracy that yields tremendous cost savings in human capital and automation while dramatically improving security.
Built on open standards for flexibility, scalability, and best-in-class cost-performance
The MetaFlows Security System uses a distributed architecture with two main components: sensors and controllers. A single controller can manage anywhere from 1 to 1,000+ sensors, providing centralized management and analysis at any scale.
Distributed sensor and controller architecture
Sensors run on standard Linux (CentOS or RHEL) augmented with our multi-functional deep packet inspection software and proprietary kernel drivers. Key features:
The controller provides centralized management and analysis capabilities:
From detection to remediation in minutes
Sensor detects suspicious behavior through multi-functional network traffic analysis
Metadata and automated incident report sent in real-time to controller and/or third-party SIEM
Controller triggers email alert or analyst sees event on real-time console
Analyst reviews metadata/report through web interface or SIEM, queries sensor for payload data
Analyst files incident report with relevant metadata and payload evidence
Instantiate remediation policies through Soft IPS or verify existing protections
Multi-functional analysis working together to detect threats
Coordinates activities across multiple sessions to detect malware infection lifecycles that traditional IDS systems miss.
IDS/IPS events generated by reconstructing sessions and examining them for known security violation patterns.
Monitor file transmissions across your network with 50+ antivirus engines and optional sandbox analysis.
Block unwanted traffic in passive mode without inline deployment risks or performance impact.
Automatically highlights network patterns showing scans, anomalous bandwidth usage, or data exfiltration.
Extract files from packet logs to analyze suspected downloads, exploit payloads, or data exfiltration.
Discover network services, user agents, DNS names, and DHCP leases by processing packet payloads.
Execute external vulnerability scans against public-facing systems to identify exposure before attackers exploit it.
Import and export security events in multiple formats for seamless integration with existing infrastructure.
Industry-leading deep packet inspection cost-performance ratio
Thanks to MetaFlows' pioneering work on open source core-based IDS parallelism (PF_RING), our appliances achieve exceptional performance on commodity hardware. This approach provides enormous flexibility while delivering one of the best cost-performance ratios in the industry.
8-core parallel processing achieves nearly 700 Mbps sustained throughput with 6,765 ET Pro Snort signatures
Sustained Snort performance with varying rule counts: GCC vs ICC compiler, NAPI vs DNA mode
64C appliance processes nearly 8 Gbps sustained with 10,003 Snort rules enabled
From small offices to large enterprises, we have the right appliance for your needs
| Appliance | Throughput | Hardware | Application |
|---|---|---|---|
| MSS-Silver | <100 Mbps | 1 CPU, VMware, Amazon EC2 | Small Enterprise, Cloud Security |
| MSS-APP-8C | 100-800 Mbps | 1 CPU (8 Cores), Amazon EC2 | Small/Medium Enterprise, Cloud |
| MSS-APP-24C | 800-5,000 Mbps | 2 CPU (32 Cores) | Medium Enterprise |
| MSS-APP-64C | 5,000-10,000 Mbps | 4 CPU (64 Cores) | Medium/Large Enterprise |
Deployment flexibility: MetaFlows software can be deployed on customer's own hardware or provided through our turnkey appliances. Our appliances are based on carefully selected commodity hardware that undergoes rigorous QA testing. We maintain nearly 100% availability across dozens of production deployments.
Passive or inline, your choice
| Capability | Inline IPS | Soft IPS (Passive) |
|---|---|---|
| Blocks TCP | โ Yes | โ Yes |
| Extracts Attacker Invariants Dynamically | โ No | โ Yes |
| Block IP from Console | โ No | โ Yes |
| Blocks UDP and ICMP | โ Yes | โ No |
| Software Failure Impact | All Traffic Stops | All Traffic Through |
| Hardware Failure Impact | All Traffic Stops | All Traffic Through |
| Power Loss Impact | All Traffic Through | All Traffic Through |
| Performance Impact | ~200 ยตs Latency | None |
MetaFlows' Soft IPS reliably blocks unwanted traffic in passive mode by injecting spoofed TCP packets to disrupt communications. This refined approach is as effective as inline deployment without the reliability and latency concerns. Nearly all our customers use Soft IPS.
| Product | Security Events & Logs | Sensor Configuration | Payloads |
|---|---|---|---|
| MSS SaaS | MetaFlows Cloud | MetaFlows Cloud | Sensor Disk/SAN |
| MSS SaaS Local | Local Sensor Disk | MetaFlows Cloud | Sensor Disk/SAN |
| MSS GE | Global Enterprise Controller | Global Enterprise Controller | Sensor Disk/SAN |
| MSS Standalone | External SIEM | Sensor Disk | Sensor Disk/SAN |
Schedule a personalized demo to see how MetaFlows can protect your network
Request Demo