Search results

52 results for: "real-time traffic classification"


  1. Software IP probe R&S®Net Sensor OEM

    R&S®Net Sensor OEM is a powerful software IP probe that delivers the right insights for advanced network analytics. The probe can be deployed on COTS hardware, as well as on virtualized and cloud environments. Based on our DPI engine R&S®PACE 2, its high performance and scalability enable innovative solutions for the networks of the future. Thanks to its open APIs and additional modules R&S®Net Sensor OEM can be tailored to fit any use case. It is designed to adapt flexibly to different networks and individual reporting requirements and granularity.

    Product Score: 0

  2. DEM deployments to grow ninefold over the next three years — DPI-driven application awareness critical to sustaining growth

    Leipzig, Germany, April 21, 2021 — ipoque GmbH, a Rohde & Schwarz company and provider of industry-leading OEM deep packet inspection (DPI) software, today published their first report on digital experience monitoring (DEM), addressing user experience monitoring for cloud and software as a service (SaaS), and the importance of real-time traffic intelligence provided by DPI. The report, which is based on a survey of leading DEM vendors, finds that 91 % of DEM vendors identify DPI as a key capability for enhancing DEM monitoring insights.

    Press release Score: 0

  3. Rohde & Schwarz Cybersecurity Selected as Preferred Network Traffic Analytics Supplier by European Communication Service Provider

    After extensive technical evaluations and field-testing of all major network traffic analytics vendors, Rohde & Schwarz Cybersecurity has been identified as the only player able to deliver technology flexible enough for the provider.

    Press release Score: 0

  4. DNS Tunneling Detection Feature of Rohde & Schwarz Cybersecurity’s Network Traffic Analysis Software Eliminates Weak Spots of Firewalls to Preserve Security

    The OEM deep packet inspection software R&S PACE 2 now improves the reliability and credibility of network protection solutions. When embedded in a firewall, malicious attacks that bypass common security policies via DNS tunneling can be identified and prevented.

    Press release Score: 0

  5. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 0

  6. Complementing WiFi 6 technologies with DPI intelligence to make the best of both worlds

    WiFi 6 provides the technical possibilities for enhancing the robustness, speed and security of ubiquitously networked computing. Deep packet inspection, in turn, improves the data foundation on which the technical capabilities of WiFi 6 are used. WiFi 6 and DPI are both useful on their own, but together, they function as complements that provide a real boost to any WLAN data network.

    Blog post Score: 0

  7. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0

  8. R&S®PACE 2: a lightweight DPI engine for big network performance gains

    Performance vs. cost – Why is having a small memory footprint important for DPI deployed in virtualized and containerized environments? This article discusses the implications of a DPI engine with a small memory footprint on network and application performance, across virtualized and containerized architectures as well as the network functions into which it is embedded.

    Blog post Score: 0

  9. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post Score: 0

  10. Seeing the unseen: enhancing application observability through DPI

    Observability has become an important component in application performance monitoring, as application telemetry continues to grow broader, deeper and more granular. It ranges from broad data on network conditions such as latency and speeds, to granular insights on each server. It sheds light on each individual transaction that collectively make up the performance of the application. Why is observability important for APM and what is the role of DPI in it?

    Blog post Score: 0