Search results

30 results for: "cyberattacks"


  1. Not a child's play: tackling online safety with DPI-enhanced parental controls

    Excessive levels of unmonitored online activity among children could lead to cyber-bullying, potentially inappropriate contact with adults or adverse health effects. By implementing comprehensive parental control measures, operators are able to add value to their service plans, deliver a safer experience for customers and boost revenues and customer loyalty in the long run. How does network intelligence provided by DPI enables operators to provide these controls as part of their service?

    Blog post Score: 0

  2. Rohde & Schwarz launches NAT/ mobile tethering transparency plug-in for analytics market

    Leipzig, Germany — February 19, 2020 — Today, ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, announced that they have launched an easy-to-integrate software plug-in for network address translation (NAT) detection and mobile tethering transparency suitable for analytics and cybersecurity vendors. The plug-in in combination with the leading OEM DPI software R&S®PACE 2 detects NATing and devices behind the corresponding routing device, as well as the applications used.

    Press release Score: 0

  3. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0

  4. Cutting up the perfect piece: DPI-enhanced traffic intelligence for 5G network slicing

    Unlike its predecessor networks, 5G involves network slicing which overlays logical networks on a common infrastructure, creating different ‘slices’ that act as separate networks. This article discusses the need for real-time traffic intelligence for 5G network slicing. It explains 5G network slicing, the 5G usage classes and how real-time intelligence provided by DPI enables the creation and implementation of various traffic management policies as well as how it supports network optimization and monetization.

    Blog post Score: 0

  5. Rohde & Schwarz R&S PACE 2 DPI engine reduces cost and risk for network security vendors

    Deep packet inspection (DPI) is an asset for modern network security solutions. The technology addresses a wide range of network security challenges including both malware and non-malware threats. At the RSA Conference in San Francisco, Rohde & Schwarz demonstrates the highest performing DPI software on the market, enabling cybersecurity vendors to strengthen their solutions and hold off hackers.

    Press release Score: 0

  6. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 0

  7. Keeping containers and pods safe in the cloud: How network visibility helps

    The architecture of microservices often results in an expanded attack surface of cloud-native applications. However, security risks and vulnerabilities inherent in container environments can be mitigated using real-time packet visibility. Find out more about the role of deep packet inspection (DPI) for container network security in the context of microservices and cloud-native applications.

    Blog post Score: 0

  8. Managing HetNets: How application awareness drives intelligent mobile data offloading decisions

    Mobile data offloading helps operators optimize network capacity, improve network performance, enhance service quality and provide ubiquitous connectivity. Deep packet inspection is key in enabling intelligent traffic offloading: It offers real-time identification of the underlying traffic — whether it is latency-sensitive, mission-critical or bandwidth-intensive — paving the way for enhanced network performance, and service quality.

    Blog post Score: 0

  9. Enhancing network visibility for SD-WAN in the era of cloud and SaaS

    One of the most touted benefits of SD-WAN is the execution of network policies via dynamic provisioning of network services such as firewalls, load balancers and session controllers. With SD-WAN, centrally controlled orchestrators can now control network functions remotely, allowing network services to respond instantaneously to the type of application that is being delivered. However, to respond to the demands of the traffic and dynamically provision network services by application types, networks require network visibility through application awareness. Identifying an application, its attribute or its application family allows networks to become intelligent enforcing corresponding policies.

    Blog post Score: 0

  10. How COVID-19 became the tipping point for enterprise digital revolution

    Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

    Blog post Score: 0