Multi-session correlation technology that detects sophisticated attacks traditional tools miss. Proven protection from nation-state threats to everyday malware.
Most intrusion detection systems analyze network traffic one session at a time. This works for simple attacks, but sophisticated threats don't operate in isolation.
Modern attackers use multi-stage campaigns: reconnaissance, exploitation, lateral movement, and data exfiltration. Traditional IDS sees individual sessions as benign, missing the larger attack pattern.
The result? Advanced persistent threats, botnet infections, and coordinated attacks slip through undetected while your team drowns in false positives from signature-based tools.
MetaFlows correlates activity across multiple sessions to identify attack patterns that span hours, days, or weeks. We see what others miss.
Our flagship multi-session correlation engine tracks the complete infection lifecycle, from initial compromise through command-and-control communications to data theft.
Full protocol analysis combined with behavioral analytics. We don't just look at headersβwe understand what's actually happening in your network traffic.
Immediate alerts when threats are detected, with comprehensive context about the attack chain. Know exactly what's happening and how to respond.
Machine learning models that evolve with emerging threats. Our system gets smarter as attackers adapt their techniques.
Clear, prioritized insights that help your team focus on real threats. No more alert fatigue from overwhelming false positives.
Works alongside your existing security infrastructure. SIEM integration, API access, and standard log formats for easy deployment.
Built on open standards for flexibility, scalability, and best-in-class cost-performance
The MetaFlows Security System uses a distributed architecture with two main components: sensors and controllers. A single controller can manage anywhere from 1 to 1,000+ sensors, providing centralized management and analysis at any scale.
Distributed sensor and controller architecture
Sensors run on standard Rocky Linux 9 augmented with our multi-functional deep packet inspection software and proprietary kernel drivers. Key features:
The controller provides centralized management and analysis capabilities:
Sensor detects suspicious behavior through multi-functional network traffic analysis
Metadata and automated incident report sent in real-time to controller and/or SIEM
Controller triggers email alert or analyst sees event on real-time console
Analyst reviews metadata through web interface or SIEM, queries sensor for payload data
Analyst files incident report with relevant metadata and payload evidence
Instantiate remediation policies through Soft IPS or verify existing protections
Industry-leading deep packet inspection cost-performance ratio
Thanks to MetaFlows' pioneering work on open source core-based IDS parallelism (PF_RING), our appliances achieve exceptional performance on commodity hardware. This approach provides enormous flexibility while delivering one of the best cost-performance ratios in the industry.
8-core parallel processing achieves nearly 700 Mbps sustained throughput with 6,765 ET Pro Snort signatures
64C appliance processes nearly 8 Gbps sustained with 10,003 Snort rules enabled
From small offices to large enterprises, we have the right appliance for your needs
| Appliance | Throughput | Hardware | Application |
|---|---|---|---|
| MSS-Silver | <100 Mbps | 1 CPU, VMware, Amazon EC2 | Small Enterprise, Cloud Security |
| MSS-APP-8C | 100-800 Mbps | 1 CPU (8 Cores), Amazon EC2 | Small/Medium Enterprise, Cloud |
| MSS-APP-24C | 800-5,000 Mbps | 2 CPU (32 Cores) | Medium Enterprise |
| MSS-APP-64C | 5,000-10,000 Mbps | 4 CPU (64 Cores) | Medium/Large Enterprise |
Deployment flexibility: MetaFlows software can be deployed on customer's own hardware or provided through our turnkey appliances. Our appliances are based on carefully selected commodity hardware that undergoes rigorous QA testing. We maintain nearly 100% availability across dozens of production deployments.
MetaFlows' Soft IPS reliably blocks unwanted traffic in passive mode by injecting spoofed TCP packets to disrupt communications. This refined approach is as effective as inline deployment without the reliability and latency concerns. Nearly all our customers use Soft IPS.
| Capability | Inline IPS | Soft IPS (Passive) |
|---|---|---|
| Blocks TCP | β Yes | β Yes |
| Extracts Attacker Invariants Dynamically | β No | β Yes |
| Block IP from Console | β No | β Yes |
| Blocks UDP and ICMP | β Yes | β No |
| Software Failure Impact | All Traffic Stops | All Traffic Through |
| Hardware Failure Impact | All Traffic Stops | All Traffic Through |
| Power Loss Impact | All Traffic Through | All Traffic Through |
| Performance Impact | ~200 Β΅s Latency | None |
Flexible deployment options that fit your infrastructure and compliance requirements.
Join security teams protecting critical infrastructure worldwide.