IP Classification, Metadata Extraction and Content Extraction for Network Security

Qosmos provides the richest view into network traffic on the market today, with thousands of protocols and metadata attributes. Take advantage of our experience from a wide array of security use cases, including in virtualized environments (SDN & NFV).


Typical use of Qosmos software inside security solutions 

  • Qosmos ixEngine classifies traffic and extracts metadata which are used for active security policy enforcement (inside NGFW, UTM, etc.)
  • Qosmos ixEngine extracts file content and metadata which are used for detailed content analysis (malware protection, DLP, etc.)


 Use cases for Qosmos ixEngine 



  • Detection of lateral movements

  • User behavior analysis

  • Micro-segmentation (inter-VM visibility & firewalling)

  • Security Information and Event Management (SIEM)

  • Cloud security


Benefits of using Qosmos technology

  • Go beyond protocol classification and take advantage of protocol metadata, the attributes of a session that show application behavior (i.e. Facebook user launching a video)
  • Focus your development resources on building great security products, not reinventing DPI technology
  • Get always fresh protocol signatures: new signatures are constantly available and can be updated on-the-fly without service interruption of your product
  • Develop your custom proprietary protocol signatures independently, using Qosmos tools


Cybersecurity 500

“All the benefits of Layer 7 visibility in a traditional network architecture open up when adding Layer 7 classification in a virtualized environment: administrators can see traffic based on applications or even components of applications, providing the ability to build a wide variety of security policies.”

Jeff Wilson, Research Director, Cybersecurity Technology, IHS Technology (Infonetics)

IHS Markit Logo