Review: MetaFlows Security System

By

This is a killer app. The more we watched this one sort through the data that it was monitoring - over a million events and flows at a major university - and dig down and analyze it, the more we wanted one.

This is a very serious service/application that we have to admit also is very cool. This is an intrusion detection system (IDS)/intrusion prevention system (IPS) on steroids. It uses just about every security paradigm that we can think of. It is tied into a network of honeypots all over the world. It allows both IDS and IPS, and it has a level of detail and drilldown that enables solid forensic analysis of events.

Review: MetaFlows Security System

Especially impressive is the service's ability to detect bots and prevent their activities. This capability comes from sophisticated behavior analysis, which can be built into your sensors. The sensors can contain a wide variety of standard and non-standard tools. The commonality, though, is that these tools gather information and then ship it out. That means that users can employ fairly lightweight sensors or, in a sensitive, high performance network opt for far higher performance sensors. The choice is up to the user. However one goes, though, the sophisticated analysis and correlation is performed in the cloud, a performance and functionality benefit.

Pricing on this service is almost a giveaway - with a starting point of $1,089 per year for a single core sensor. Depending on what is needed in one's application,  64 cores can be implemented, at added cost, of course. But make no mistake: This may have a lightweight price and a lightweight presence on a network, but what it does is far from lightweight.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?