Back to our home page
  • Customer support
  • Contact
  • Information and complaints
Contact Us Request callback Share content with…
Share via Facebook Share via X Xing LinkedIn
  • Solutions ▾
    • DPI for cybersecurity solutions ▾
      • DPI for SASE
      • DPI for SSE
      • DPI for firewalls
      • DPI for data loss prevention
      • DPI for SIEM and threat intelligence solutions
    • DPI for networking solutions ▾
      • DPI for DEM solutions
      • DPI for SD-WAN solutions
      • DPI for NPM and APM solutions
      • DPI for wireless networking devices
    • DPI for telco solutions ▾
      • DPI for 5G UPFs
      • DPI for telecom analytics
      • DPI for service assurance
      • DPI for network probes
      • DPI for vEPC/ 5G core vendors
    • GTP and 5G correlation for mobile networking solutions ▾
      • GTP correlation for data analytics
      • GTP correlation for policy control
      • GTP correlation for traffic management
      • GTP correlation for service assurance
      • GTP correlation for mobile network security
  • Products ▾
    • Next-gen deep packet inspection software ▾
      • DPI engine R&S®PACE 2
      • VPP DPI engine R&S®vPACE
      • Build or buy DPI
    • Monitoring solutions ▾
      • Network probe R&S®Probe Observer
    • User and control plane correlation ▾
      • GTP correlation module R&S®GSRM
  • Customer insights
  • News & media ▾
    • Overview of all resources ▾
      • Whitepapers
      • Case studies
      • Brochures
      • Webinars
      • Reports & e-books
    • Press releases
    • Trade shows & events
    • Network technology insights, trends and perspectives ▾
      • GenAI in network management
      • Analytics & AI in Open RAN
      • Application-aware SD-WANs
      • DPI & 5G
  • Blog
  • Company ▾
    • About us
    • People at ipoque
    • Our service promise
    • Our network technology and innovation experts
  • Career ▾
    • Open positions at ipoque
    • Dive deep into networks
    • Students & young professionals ▾
      • Empowering young talents - Deutschlandstipendium
  1. Home
  2. The ipoque blog

The ipoque blog

  • Share with Xing
  • Share with LinkedIn
  • Share by email
  • Share with Facebook
  • Share with X
Reset filters
Traffic jam with a yellow car in the middle
Magnus Bartsch | 28.08.2024
Blog post

Six reasons why DPI is better than DNS analysis

As networks evolve and encryption becomes more prevalent, traditional DNS analysis is struggling to keep up. While DNS provides essential insights into domain activity, its limitations leave gaps in security and traffic visibility. DPI fills these gaps by providing a more complete view of network activity, ensuring both stronger security and better performance. Learn how DPI goes beyond DNS queries to analyze every packet of data, even in encrypted traffic.

More information
Empty blue interior with chessboard floor and one open and one closed door
Sebastian Müller | 08.08.2024
Blog post

DPI for ZTNA and SSE: Killing two birds with one stone

By providing real-time traffic intelligence, DPI creates a continuous adaptive context for user access policies, significantly increasing the security, intelligence, and efficiency of SSE components such as CASB, SWG and FWaaS, DPL, and SSL. This DPI-driven approach not only strengthens network access controls, but also reduces the workload of various tools, ensuring better cloud-based security outcomes and faster threat response.

More information
five wooden cubes with symbols, arranged in a pyramid shape next to a laptop keyboard representing mobile work and enterprise networks
Tobias Roeder | 13.09.2022
Blog post

Security Service Edge (SSE) and DPI: Converged security meets advanced traffic awareness

Security Service Edge (SSE) provides a flexible yet scalable solution for implementing fine-grained access control for enterprise applications and for securing them against malicious activity. In a unified, single-pass SSE architecture, deep packet inspection enables a single, yet powerful point for traffic inspection that equips CASB, SWG, FWaaS, DNS, DLP and WAAPaaS with the information necessary to filter traffic effectively, block malicious sites and safeguard valuable enterprise data. Learn more about SSE and how it benefits from DPI in this article.

More information
a modern mailbox with 12 compartments representing micro-segmentation in cloud environments
John Bonzey | 25.07.2022
Blog post

Close-up in the cloud: How micro-segmentation benefits from DPI

Micro-segmentation segregates networks into smaller VLANs or subnets that are accorded their own security functionalities to safeguard cloud applications from laterally moving threats that typically afflict virtual machines and containers in the cloud. The use of DPI in micro-segmentation can greatly aid in securing applications in the cloud or specifically distributed workloads hosted on virtual machines and containers.

More information
A green praying mantis on a keyboard representing aubscriber awareness and mobile network security.
Sebastian Müller | 06.01.2022
Blog post

How subscriber awareness augments mobile network security

Conventional load balancing across mobile networks leaves network security functions with huge visibility gaps. Furthermore, in the context of 5G, the need for higher bandwidth and speeds across applications that are data-intensive and that connect to multiple end nodes simultaneously poses new challenges for operators. R&S®GSRM in combination with R&S®PACE 2 delivers deeper, more granular insights into the risks and vulnerabilities that are present in a mobile network. Operators benefit from enhanced network intelligence to manage and improve mobile network security.

More information
Foamy window being cleaned to show encrypted traffic visibility
Tobias Roeder | 16.12.2021
Blog post

DPI conquers encrypted traffic with machine learning and deep learning

Encryption keeps packets obscure and safe, but it also poses various visibility and monitoring challenges for network operators. In an encrypted world, how can they maintain accurate traffic visibility and classification for reliable threat detection and network management? The answer is Encrypted Traffic Intelligence (ETI). By incorporating machine learning and deep learning, the DPI engine R&S®PACE 2 is able to deliver this intelligence, providing application awareness for encrypted, obfuscated or anonymized traffic.

More information
a white card featuring a blue cloud held by a hand against a blue background representing CASB enhanced by DPI.
Magnus Bartsch | 06.12.2021
Blog post

DPI-enhanced CASB for tighter security in the cloud

As a middleman negotiating traffic flows between users on the ground and applications in the cloud, the importance of the cloud access security broker (CASB) continues to grow. But to be able to provide real-time insights, end-to-end visibility and accurate detection of threats and anomalies, DPI engines such as R&S®PACE 2 are a critical addition. By combining the capabilities of both the CASB and DPI, enterprises are sure to be safe as they move their work to the cloud.

More information
A padlock securely fastened to a hook on top of a computer keyboard, symbolizing the importance of cybersecurity in the digital age.
Stephan Klokow | 20.04.2021
Blog post

How advanced traffic identification complements honeypot networks

Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

More information
back to top
Visit our linkedin social account
Blog
ipoque GmbH, a Rohde & Schwarz company

Address

Augustusplatz 9 04109 Leipzig info.ipoque@rohde-schwarz.com

© by ipoque GmbH 2026

  • Home
  • Imprint
  • Privacy Statement
  • Terms & Conditions
  • Contact
  • Customer support
  • Cookie list