Search results

48 results for: "real-time traffic classification"


  1. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 0

  2. Complementing WiFi 6 technologies with DPI intelligence to make the best of both worlds

    WiFi 6 provides the technical possibilities for enhancing the robustness, speed and security of ubiquitously networked computing. Deep packet inspection, in turn, improves the data foundation on which the technical capabilities of WiFi 6 are used. WiFi 6 and DPI are both useful on their own, but together, they function as complements that provide a real boost to any WLAN data network.

    Blog post Score: 0

  3. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0

  4. R&S®PACE 2: a lightweight DPI engine for big network performance gains

    Performance vs. cost – Why is having a small memory footprint important for DPI deployed in virtualized and containerized environments? This article discusses the implications of a DPI engine with a small memory footprint on network and application performance, across virtualized and containerized architectures as well as the network functions into which it is embedded.

    Blog post Score: 0

  5. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post Score: 0

  6. Seeing the unseen: enhancing application observability through DPI

    Observability has become an important component in application performance monitoring, as application telemetry continues to grow broader, deeper and more granular. It ranges from broad data on network conditions such as latency and speeds, to granular insights on each server. It sheds light on each individual transaction that collectively make up the performance of the application. Why is observability important for APM and what is the role of DPI in it?

    Blog post Score: 0

  7. Not a child's play: tackling online safety with DPI-enhanced parental controls

    Excessive levels of unmonitored online activity among children could lead to cyber-bullying, potentially inappropriate contact with adults or adverse health effects. By implementing comprehensive parental control measures, operators are able to add value to their service plans, deliver a safer experience for customers and boost revenues and customer loyalty in the long run. How does network intelligence provided by DPI enables operators to provide these controls as part of their service?

    Blog post Score: 0

  8. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post Score: 0