Search results

52 results for: "cloud security"


  1. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0

  2. ipoque GmbH Grows Customer Base, Doubles Headcount and Expands Capabilities

    LEIPZIG, Germany – Feb 12, 2019 – ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, today announced record growth in 2018, with three of the five leading virtualized evolved packet core (vEPC) vendors embedding ipoque’s R&S®PACE 2 into their solutions. To meet increased customer demands, ipoque grew its employee headcount by nearly 115 percent year-over-year, making significant additions to its development team. The company also expanded geographically, opening a new office in Berlin.

    Press release Score: 0

  3. Reports & E-books

    Here you can find the latest ipoque DEM report and E-books to learn more about deep packet inspection (DPI) and IP classification technologies. Dive deeper into the world of real-time network analytics and layer 7 application awareness to learn how DPI can enhance your solution.

    Page Score: 0

  4. vCPE and uCPE: How much cloud do we really need?

    CPE virtualization abolishes proprietary hardware, vendor lock-in, congested rack space and expensive on-site maintenance. How has the cloud transformed CPE and what are the CPE deployment models that best fit today’s diverse traffic? This blog post discusses virtualized CPE (vCPE) and universal CPE (uCPE) in the context of how DPI enables the development of network architectures that are aligned to today’s traffic needs. It illustrates in detail how deep intelligence on traffic and applications enables the optimization of CPE architecture covering options that include on-premises, data center and cloud deployments and the assessment of these options in terms of overall cost, network efficiency and application performance.

    Blog post Score: 0

  5. Maximizing the potential of ZTNA with deep packet inspection

    In today’s hybrid enterprise environments, zero-trust network access (ZTNA) is becoming increasingly important to improve the end-user experience while ensuring that the network is secured against attacks and malicious activities. This is possible with next-generation DPI software. DPI supports ZTNA in implementing granular, user- and context-aware authentication across different classes of users, devices, clouds and applications. DPI’s ability to identify traffic anomalies can also be used by ZTNA to identify cyberattacks and other threats on enterprise networks.

    Blog post Score: 0

  6. How COVID-19 became the tipping point for enterprise digital revolution

    Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

    Blog post Score: 0

  7. DPI-driven application and protocol classification

    As the internet is at the center of more and more business, application awareness will be needed even more to enable optimal distribution of network content. New and intensified security threats will emerge as business and commerce virtualize. This article discusses how an advanced DPI engine featuring port-based matching, pattern matching and encrypted traffic intelligence can enhance the monitoring performance, security and monetization of networks.

    Blog post Score: 0

  8. Complementing WiFi 6 technologies with DPI intelligence to make the best of both worlds

    WiFi 6 provides the technical possibilities for enhancing the robustness, speed and security of ubiquitously networked computing. Deep packet inspection, in turn, improves the data foundation on which the technical capabilities of WiFi 6 are used. WiFi 6 and DPI are both useful on their own, but together, they function as complements that provide a real boost to any WLAN data network.

    Blog post Score: 0

  9. Cloud, SaaS and SASE – Three reasons why DEM needs DPI

    Users want fast and seamless access to any application they need, with productivity hinging on how well these applications are delivered, regardless of whether they are corporate, cloud or SaaS applications. As such, Digital experience monitoring (DEM) will increasingly enter the focus of all enterprises, which means the need for traffic visibility provided by advanced DPI engines such as R&S®PACE 2 will continue to rise.

    Blog post Score: 0

  10. Handling Log4j security vulnerabilities with deep packet inspection

    Log4j is a library used by Java developers to record or log network events. However, recently it has come to light that Log4j allows for significant security breaches and attacks. Log4j security vulnerabilities have taken the IT world by storm. A simple email message can be manipulated to instruct Log4j to leak critical data over the Internet, execute crypto mining and launch ransomware. DPI can stave off such threats by offering real-time detection of Log4jShell exploits and the real-time identification of consequential attacks on the system.

    Blog post Score: 0