Back to our home page
  • Customer support
  • Contact
  • Information and complaints
Contact Us Request callback Share content with…
Share via Facebook Share via X Xing LinkedIn
  • Solutions ▾
    • DPI for cybersecurity solutions ▾
      • DPI for SASE
      • DPI for SSE
      • DPI for firewalls
      • DPI for data loss prevention
      • DPI for SIEM and threat intelligence solutions
    • DPI for networking solutions ▾
      • DPI for DEM solutions
      • DPI for SD-WAN solutions
      • DPI for NPM and APM solutions
      • DPI for wireless networking devices
    • DPI for telco solutions ▾
      • DPI for 5G UPFs
      • DPI for telecom analytics
      • DPI for service assurance
      • DPI for network probes
      • DPI for vEPC/ 5G core vendors
    • GTP and 5G correlation for mobile networking solutions ▾
      • GTP correlation for data analytics
      • GTP correlation for policy control
      • GTP correlation for traffic management
      • GTP correlation for service assurance
      • GTP correlation for mobile network security
  • Products ▾
    • Next-gen deep packet inspection software ▾
      • DPI engine R&S®PACE 2
      • VPP DPI engine R&S®vPACE
      • Build or buy DPI
    • Monitoring solutions ▾
      • Network probe R&S®Probe Observer
    • User and control plane correlation ▾
      • GTP correlation module R&S®GSRM
  • Customer insights
  • News & media ▾
    • Overview of all resources ▾
      • Whitepapers
      • Case studies
      • Brochures
      • Webinars
      • Reports & e-books
    • Press releases
    • Trade shows & events
    • Network technology insights, trends and perspectives ▾
      • GenAI in network management
      • Analytics & AI in Open RAN
      • Application-aware SD-WANs
      • DPI & 5G
  • Blog
  • Company ▾
    • About us
    • People at ipoque
    • Our service promise
    • Our network technology and innovation experts
  • Career ▾
    • Open positions at ipoque
    • Dive deep into networks
    • Students & young professionals ▾
      • Empowering young talents - Deutschlandstipendium
  1. Home
  2. The ipoque blog

The ipoque blog

  • Share with Xing
  • Share with LinkedIn
  • Share by email
  • Share with Facebook
  • Share with X
Reset filters
An egg in a cage representing the idea of deep packet inspection for threat detection.
Christine Lorenz | 07.03.2023
Blog post

Nowhere to hide: Using deep packet inspection for threat detection

Sudden changes in application speeds and latencies can indicate a cyberattack. This article discusses how threat detection can be augmented with deep packet inspection. It looks at how granular, application-level and service-level insights from DPI can be built into an enterprise’s threat detection system for highly accurate and reliable identification of malicious, suspicious and anomalous traffic.

More information
Padlocks affixed to a golden '@' symbol on a keyboard symbolically depicting ZTNA and DPI.
Christine Lorenz | 23.02.2022
Blog post

Maximizing the potential of ZTNA with DPI

In today’s hybrid enterprise environments, zero-trust network access (ZTNA) is becoming increasingly important to improve the end-user experience while ensuring that the network is secured against attacks and malicious activities. This is possible with next-generation DPI software. DPI supports ZTNA in implementing granular, user- and context-aware authentication across different classes of users, devices, clouds and applications. DPI’s ability to identify traffic anomalies can also be used by ZTNA to identify cyberattacks and other threats on enterprise networks.

More information
A padlock securely fastened to a hook on top of a computer keyboard, symbolizing the importance of cybersecurity in the digital age.
Stephan Klokow | 20.04.2021
Blog post

How advanced traffic identification complements honeypot networks

Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

More information
Red heart with a white cross on top of a stethoscope on a green table.
Sebastian Müller | 23.02.2021
Blog post

Saving every heartbeat: How DPI helps secure IoT networks for healthcare

IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

More information
A paper fish with a user name and password on it sitting on top of a fishing net representing te concept of DPI and DLP.
Stephan Klokow | 25.01.2021
Blog post

Data loss prevention: Risk and reputation management with real-time visibility

To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

More information
Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic
Stephan Klokow | 11.01.2021
Blog post

Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

More information
back to top
Visit our linkedin social account
Blog
ipoque GmbH, a Rohde & Schwarz company

Address

Augustusplatz 9 04109 Leipzig info.ipoque@rohde-schwarz.com

© by ipoque GmbH 2026

  • Home
  • Imprint
  • Privacy Statement
  • Terms & Conditions
  • Contact
  • Customer support
  • Cookie list