Back to our home page
  • Customer support
  • Contact
  • Information and complaints
Contact Us Request callback Share content with…
Share via Facebook Share via X Xing LinkedIn
  • Solutions ▾
    • DPI for cybersecurity solutions ▾
      • DPI for SASE
      • DPI for SSE
      • DPI for firewalls
      • DPI for data loss prevention
      • DPI for SIEM and threat intelligence solutions
    • DPI for networking solutions ▾
      • DPI for DEM solutions
      • DPI for SD-WAN solutions
      • DPI for NPM and APM solutions
      • DPI for wireless networking devices
    • DPI for telco solutions ▾
      • DPI for 5G UPFs
      • DPI for telecom analytics
      • DPI for service assurance
      • DPI for network probes
      • DPI for vEPC/ 5G core vendors
    • GTP and 5G correlation for mobile networking solutions ▾
      • GTP correlation for data analytics
      • GTP correlation for policy control
      • GTP correlation for traffic management
      • GTP correlation for service assurance
      • GTP correlation for mobile network security
  • Products ▾
    • Next-gen deep packet inspection software ▾
      • DPI engine R&S®PACE 2
      • VPP DPI engine R&S®vPACE
      • Build or buy DPI
    • Monitoring solutions ▾
      • Network probe R&S®Probe Observer
    • User and control plane correlation ▾
      • GTP correlation module R&S®GSRM
  • Customer insights
  • News & media ▾
    • Overview of all resources ▾
      • Whitepapers
      • Case studies
      • Brochures
      • Webinars
      • Reports & e-books
    • Press releases
    • Trade shows & events
    • Network technology insights, trends and perspectives ▾
      • GenAI in network management
      • Analytics & AI in Open RAN
      • Application-aware SD-WANs
      • DPI & 5G
  • Blog
  • Company ▾
    • About us
    • People at ipoque
    • Our service promise
    • Our network technology and innovation experts
  • Career ▾
    • Open positions at ipoque
    • Dive deep into networks
    • Students & young professionals ▾
      • Empowering young talents - Deutschlandstipendium
  1. Home
  2. The ipoque blog

The ipoque blog

  • Share with Xing
  • Share with LinkedIn
  • Share by email
  • Share with Facebook
  • Share with X
Reset filters
Christoph Jahn | 28.10.2025
Blog post

Q-Day ready: Building quantum-resistant networks with deep packet inspection

Quantum computers threaten to break RSA and ECDH, exposing years of encrypted traffic to "harvest now, decrypt later" attacks. Deep packet inspection (DPI) delivers the visibility needed to spot ciphertext manipulation, hidden malware, and PQC implementation flaws in real time. Discover how ipoque’s DPI engines, R&S®PACE2 and R&S®vPACE, strengthen quantum‑resistant networks and protect cryptographic keys. 

More information
Roy Chua
Roy Chua, AvidThink | 03.12.2024
Blog post

The impact of encryption and AI on open source in DPI: challenges and opportunities

The rise of encryption protocols is transforming network security, presenting both challenges and opportunities for open-source deep packet inspection (DPI) solutions. While open-source DPI excels at handling common encryption methods, it struggles with newer techniques, as well as anonymization and obfuscation strategies. The growing reliance on AI and machine learning in commercial DPI products offers a potential path forward, but open-source projects face obstacles in integrating these technologies due to challenges around data privacy, training, and model sharing.

More information
Lock with key on wrapped paper
Tobias Roeder | 17.09.2024
Blog post

The downside to decryption and why you need encrypted traffic intelligence

Often, networks run millions of decryption and re-encryption loops that come with various security, latency and performance implications. In our latest blog, we discuss the downside of decryption in traffic analysis, and how ipoque’s encrypted traffic intelligence (ETI) can be used to tackle even the most stringent encryption protocols without decrypting a single packet!

More information
Package with a lock symbolizing encryption due to QUIC
Tobias Roeder | 05.12.2023
Blog post

QUIC: How DPI with encrypted traffic intelligence supports the web’s latest protocol

QUIC is a network layer protocol that uses the UDP protocol and TLS-based encryption to deliver web traffic between devices. This article discusses the visibility challenges introduced by QUIC and the impact of this on traffic management and security. It also assesses how deep packet inspection (DPI) with encrypted traffic intelligence (ETI) addresses these challenges and powers networking and cybersecurity tools against the rapid growth of QUIC traffic.

More information
A long dark tunnel with two lanes. The image is slightly blurred and in bluish light.
Sebastian Müller | 21.08.2023
Blog post

DPI and VPNs: It's obfuscated ...

Virtual private networks (VPN), such as Psiphon, TOR and NordVPN, use various obfuscation techniques, including encryption and dynamic IP addresses, to ensure the security and privacy of data. The same techniques, inadvertently, create huge blind spots in network monitoring, leaving the network open to attacks and abuse. This article assesses how next-gen DPI by ipoque, via a rich repository of VPN signatures, identify VPN services and deliver application and threat awareness.

More information
An egg in a cage representing the idea of deep packet inspection for threat detection.
Christine Lorenz | 07.03.2023
Blog post

Nowhere to hide: Using deep packet inspection for threat detection

Sudden changes in application speeds and latencies can indicate a cyberattack. This article discusses how threat detection can be augmented with deep packet inspection. It looks at how granular, application-level and service-level insights from DPI can be built into an enterprise’s threat detection system for highly accurate and reliable identification of malicious, suspicious and anomalous traffic.

More information
A gold coin on top of a keyboard. On the right side are four small locks.
Sebastian Müller | 15.06.2022
Blog post

Cryptocurrency and DPI: Unearthing threats in the blockchain world

Crypto transactions can significantly strain modern networks given their growth, intensity and susceptibility to mass-scale attacks. Also, using encryption to anonymize cryptocurrency transactions creates huge gaps in traffic observability. Find out how the capabilities of DPI in identifying crypto protocols and applications help network operators and security vendors secure networks and devices while protecting the platforms transacting and storing cryptocurrencies.

More information
back to top
Visit our linkedin social account
Blog
ipoque GmbH, a Rohde & Schwarz company

Address

Augustusplatz 9 04109 Leipzig info.ipoque@rohde-schwarz.com

© by ipoque GmbH 2026

  • Home
  • Imprint
  • Privacy Statement
  • Terms & Conditions
  • Contact
  • Customer support
  • Cookie list