About a-team Marketing Services
The knowledge platform for the financial technology industry
The knowledge platform for the financial technology industry

A-Team Insight Blogs

Metamako Adds MetaProtect Firewall to Portfolio of FPGA Network Appliances

Subscribe to our newsletter

Metamako has extended its portfolio of field programmable gate array (FPGA) enabled network solutions with MetaProtect Firewall, a network appliance designed to deliver ultra-fast firewall protection and solve problems including situations where a firewall is mandatory but ultra-low latency and high port density are also required.

The firewall solution takes Metamako into the security space for the first time and builds on its growth plans including the company’s recent and inaugural acquisition of Chicago-based xCelor’s hardware business.

MetaProtect is a 48-port (x10GbE) network appliance that performs packet filtering in 130 nanoseconds, as well as comprehensive logging for the filters. It is flexible in how it can be configured, including the ability to specify ports that don’t need to be filtered, in which case packets are passed through in 5 nanoseconds.

Dave Snowdon, founder and chief technology officer at Metamako, says: “Clients have seen the benefits of using our low-latency devices and asked if we could improve their firewall architecture. We were able to draw on our flexible FPGA platforms and app infrastructure to very quickly build the right product for those customers and the result is MetaProtect – a low latency firewall.”

Considering situations that mandate a firewall, Snowdon suggests exchanges in Asia, for example the Korean Stock Exchange (KRX), which stipulate that a broker must ‘own and manage’ a firewall between a client’s trading servers and the exchange. The latency penalty that this introduces is a problem for trading participants, but it can be eased using Metamako’s ultra-low latency, high-density firewall solution to improve exchange-facing architecture.

Key functionality of MetaProtect includes: ultra-low latency filtering with average latency of 130 nanoseconds (1 rule) to 155 nanoseconds (510 rules); extreme determinism, a tightly bound maximum latency for each configuration; up to 510 rules per port; extensive packet statistics for all ports for advanced network monitoring; and comprehensive logging, including logged statistics of permitted and denied packets.

Subscribe to our newsletter

Related content

WEBINAR

Upcoming Webinar: Reviewing the Latency Landscape and the Next Generation of Ultra-Low Latency Infrastructure

Date: 17 September 2026 Time: 10:00am ET / 3:00pm London / 4:00pm CET Duration: 50 minutes Ultra-low latency is no longer the preserve of a handful of proprietary trading firms. As new asset classes electronify, data volumes surge, and regulatory expectations around execution quality and resilience tighten, the performance demands on trading infrastructure are broadening...

BLOG

TNS Completes Acquisition of BT Radianz, Cementing Shift in Financial Markets Connectivity

Transaction Network Services has completed its acquisition of BT Radianz, formally bringing the long-established financial markets network under the ownership of TNS and closing a deal first announced in September. Radianz, which for more than two decades has provided secure, managed connectivity between trading firms, exchanges, market data venues and service providers, now sits within...

EVENT

Eagle Alpha Alternative Data Conference, Fall, New York, hosted by A-Team Group

Now in its 8th year, the Eagle Alpha Alternative Data Conference managed by A-Team Group, is the premier content forum and networking event for investment firms and hedge funds.

GUIDE

Regulatory Data Handbook 2018/2019 – Sixth Edition

In a testament to the enduring popularity of the A-Team Regulatory Data Handbook, we are delighted to publish a sixth edition for 2018-19 of our comprehensive guide to all the regulations and rules that might impact data and data management at your institution. As in previous editions of the Regulatory Data Handbook, we have updated...