Search results

3 results for: "encryption"


  1. R&S®PACE 2 - Product brochure

    R&S®PACE 2 is a software library that uses different technologies – deep packet inspection, behavioral, heuristic and statistical analysis – to reliably detect network protocols and applications, even if they use advanced obfuscation and encryption techniques, and extract metadata in realtime. R&S®PACE 2 is used by network equipment and security vendors to enhance their products with state-of-the-art protocol and application awareness capabilities to deliver full visibility into IP-based network traffic.

    Brochure Score: 0

  2. R&S®PACE 2 - Solution guide

    ipoque's advanced OEM deep packet inspection software R&S®PACE 2 classifies thousands of network protocols and applications reliably, even in encrypted traffic, providing real-time IP traffic visibility needed for full network transparency and intelligence. By embedding the DPI software in their solutions, vendors of network equipment and software can enhance their products with state-of-the-art protocol and application awareness. R&S®PACE 2 can be deployed in a variety of use cases including Network Security (IDS/IPS), Next-Generation Firewalls, SIEM, Network Monitoring and Traffic Management, Policy and Charging, Application Delivery and Optimization, Analytics, and Mobile Data Offload. Learn more about R&S®PACE 2 features and capabilities, performance, use cases, integration as well as customer service and support in our R&S®PACE 2 solution guide.

    Brochure Score: 0

  3. R&S®PACE 2 - First packet classification

    First packet classification refers to the accurate and reliable classification of the very first packet of a flow, instead of waiting for at least 3 to 5 packets before the underlying application is identified. To enable first packet classification the advanced OEM DPI engine R&S®PACE 2 offers advanced caching techniques built on the intelligence developed from traditional DPI methods. This enables traffic policies to be meted out on the first packet itself, and implemented across all other ensuing packets for consistency, application-wide.

    Brochure Score: 0