Search results

32 results for: "cyberattacks"


  1. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post Score: 3

  2. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post Score: 2

  3. How advanced traffic identification complements honeypot networks

    Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

    Blog post Score: 1

  4. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 1

  5. Info sheet: NAT transparency plug-in for enterprise IT security

    The NAT tethering transparency plug-in by ipoque is an essential software tool for enterprises that reliably want to detect unauthorized NATing devices and secure their networks.

    Brochure Score: 0

  6. Infotecs embeds R&S®PACE 2

    “We are extremely satisfied with the support and response we have received from the Rohde & Schwarz team. Their strong understanding of our needs and prompt, expert service delivery exceeded our expectations.”

    Success Story Score: 0

  7. Deep packet inspection for threat analysis

    Saint Security uses the deep packet inspection (DPI) engine R&S®PACE 2 in its network-based advanced malware response solution MNX to identify, analyze, judge and block malicious activity.

    Case Study Score: 0

  8. Deep packet inspection for web application security

    Indigo Software embeds the DPI engine R&S®PACE2 into their web application security solution to enhance network protection and management. With the new traffic analytics capabilities, Indigo Software has been empowered to expand their business to highly regulated industries and markets.

    Case Study Score: 0

  9. Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI Software Features New Classification for Stratum Mining Protocol

    The new Stratum protocol classification functionality enhances network analytics and security solutions to identify potentially malicious mining activity. This enables enterprises to identify, control and block the network-based cryptocurrency mining.

    Press release Score: 0

  10. CELARE integrates R&S®PACE 2 to boost their monitoring sensor T-Sense

    "Our customers are increasingly seeing the need to protect their highly sensitive IT and SCADA-controlled infrastructure against malware and attacks. We decided for Rohde & Schwarz as we recognized [...]

    Success Story Score: 0