Search results

28 results for: "cyberattacks"


  1. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post Score: 1

  2. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 1

  3. Case Study: Saint Security

    Saint Security uses the deep packet inspection (DPI) engine R&S®PACE 2 in its network-based advanced malware response solution MNX to identify, analyze, judge and block malicious activity.

    Case Study Score: 0

  4. Info sheet: NAT/mobile tethering transparency plug-in for enterprise IT security

    The NAT/mobile tethering transparency plug-in by Rohde & Schwarz is an essential software tool for enterprises that reliably want to detect unauthorized NATing devices and secure their networks.

    Brochure Score: 0

  5. Infotecs embeds R&S®PACE 2

    “We are extremely satisfied with the support and response we have received from the Rohde & Schwarz team. Their strong understanding of our needs and prompt, expert service delivery exceeded our expectations.”

    Success Story Score: 0

  6. Info sheet: NAT/mobile tethering transparency plug-in

    Since multiple network devices with their distinct private IP addresses masquerade as a single public IP address, network resources can be misused. Not only does this enable tethering fraud, but it also poses a threat to network security, because unauthorized devices are outside the scope of traditional IT security. The NAT/mobile tethering transparency extension is a plug-in of our deep packet inspection (DPI) software R&S®PACE 2 that identifies devices in NAT scenarios using dedicated methods of IP traffic analytics.

    Brochure Score: 0

  7. Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI Software Features New Classification for Stratum Mining Protocol

    The new Stratum protocol classification functionality enhances network analytics and security solutions to identify potentially malicious mining activity. This enables enterprises to identify, control and block the network-based cryptocurrency mining.

    Press release Score: 0

  8. Why did CELARE integrate R&S®PACE 2 to boost their monitoring sensor T-Sense?

    "Our customers are increasingly seeing the need to protect their highly sensitive IT and SCADA-controlled infrastructure against malware and attacks. We decided for Rohde & Schwarz as we recognized [...]

    Success Story Score: 0

  9. DPI for SIEM and threat intelligence solutions

    Threat intelligence solutions like SIEMs are widely deployed by security analysts to protect sensitive network assets from the most advanced cyber threats. With about 7 billion internet-connected devices (according to data from IoT Analytics) next-generation SIEMs need to tackle the latest security breaches with advanced analytics. The challenge is in managing SIEM solutions to eliminate false positives and sort through the massive amount of data they supply quickly and efficiently. DPI-powered protocol and application classification by R&S®PACE 2 adds valuable real-time information as SIEM vendors can obtain real-time visibility into both plain and encrypted network traffic, as well as information on traffic KPIs.

    Use Case Score: 0

  10. Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

    The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

    Press release Score: 0