Search results

96 results for: "network visibility"


  1. Commercial vs open-source DPI: Does it matter?

    Commercial DPI takes traffic detection a notch higher via its ability to detect encrypted and obfuscated traffic. This inherently requires advanced methods such as statistical and behavioral analysis and machine learning, technologies that are not available in the open-source versions. This article debates the advantages of commercial vs. open-source DPI. While it shares the merits of both options, it highlights the reliability, superior performance, efficiency, security and service consistency provided by vendors of commercial DPI and how these qualities help network administrators and managers monitor and secure their networks more effectively.

    Blog post Score: 0

  2. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post Score: 0

  3. Webinar: DPI performance measurements for 5G UPF setups

    To make the best of user plane functions (UPFs) in 5G, application awareness is key. Watch our webinar with Tobias Roeder, Senior Application Engineer DPI at ipoque, to learn how to transfer DPI deployments from 4G PGW into 5G UPF, create application-centric traffic profiles in traffic generators, improve DPDK and VPP configurations and more.

    Webinar Score: 0

  4. Bringing shadow IT out of the dark with DPI-driven traffic awareness

    The usage of unofficial, external applications and devices by employees in their normal course of work is growing. While this drives innovation and efficiency across various tasks, it poses a number of security and operational risks to the enterprise. To retain the gains while curtailing the risks, comprehensive identification of shadow IT activity leveraging tools such as DPI is necessary, in developing the right policies and approaches to managing the continuous rise of shadow IT across today’s enterprises.

    Blog post Score: 0

  5. Deep packet inspection for web application security

    Indigo Software embeds the DPI engine R&S®PACE 2 into their web application security solution to enhance network protection and management. These new traffic analytics capabilities empower Indigo Software to expand their business to highly regulated industries and markets.

    Case Study Score: 0

  6. Not a child's play: tackling online safety with DPI-enhanced parental controls

    Excessive levels of unmonitored online activity among children could lead to cyber-bullying, potentially inappropriate contact with adults or adverse health effects. By implementing comprehensive parental control measures, operators are able to add value to their service plans, deliver a safer experience for customers and boost revenues and customer loyalty in the long run. How does network intelligence provided by DPI enables operators to provide these controls as part of their service?

    Blog post Score: 0