Search results

18 results for: "digital enterprise"


  1. Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

    The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

    Press release Score: 0

  2. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0

  3. About us | From network data to intelligence

    ipoque is a leading provider of deep packet inspection and network analytics software. Founded as a software start-up in Leipzig in 2005 and acquired by the Munich-based Rohde & Schwarz group in 2011, we combine the best of two worlds: agile software development and the resources of an international electronics group.

    Page Score: 0

  4. Aricent and Rohde & Schwarz Cybersecurity unveil a unique bandwidth control solution to enhance customer experience for mobile operators and network equipment providers

    Aricent Traffic Detection Function (TDF) provides communication service providers an opportunity to capitalize on analytics for traffic optimization, charging and content manipulation, working hand in hand with the policy management system.

    Press release Score: 0

  5. Bringing shadow IT out of the dark with DPI-driven traffic awareness

    The usage of unofficial, external applications and devices by employees in their normal course of work is growing. While this drives innovation and efficiency across various tasks, it poses a number of security and operational risks to the enterprise. To retain the gains while curtailing the risks, comprehensive identification of shadow IT activity leveraging tools such as DPI is necessary, in developing the right policies and approaches to managing the continuous rise of shadow IT across today’s enterprises.

    Blog post Score: 0

  6. Video streaming: networks and the game of bandwidth

    It is evident that video streaming is on a fast track to becoming the new definition of the ‘Internet’, easily outdoing other bandwidth-intensive applications such as cloud gaming, augmented reality (AR) and virtual reality (VR). The demand for video content seems to move in tandem with network speeds, given that better speeds translate into faster streaming and improved quality of experience (QoE). One of the immediate effects of a rapid increase in video traffic is the strain it puts on network resources, resulting in network congestion and poor network performance. While this impairs almost all applications to some degree, video takes the biggest hit given its dependency on real-time availability of bandwidth and speeds. What operators need now are the right tools that deliver the required intelligence, timely and accurately, to maintain the required QoE and to successfully deploy their video streaming strategies.

    Blog post Score: 0

  7. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0

  8. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post Score: 0