Search results

51 results for: "enterprise security"


  1. NAT transparency plug-in for enterprise IT security

    The NAT tethering transparency plug-in by ipoque is an essential software tool for enterprises that reliably want to detect unauthorized NATing devices and secure their networks.

    Brochure Score: 14

  2. Rohde & Schwarz Cybersecurity DPI Solution Enables Security and Traffic Control of Critical Enterprise Cloud Applications

    Barracuda’s cloud-ready firewalls utilize the deep packet inspection (DPI) engine R&S PACE 2 to achieve reliable application visibility which allows for controlling network traffic and facilitating the secure delivery of critical cloud business applications.

    Press release Score: 12

  3. Bringing shadow IT out of the dark with DPI-driven traffic awareness

    The usage of unofficial, external applications and devices by employees in their normal course of work is growing. While this drives innovation and efficiency across various tasks, it poses a number of security and operational risks to the enterprise. To retain the gains while curtailing the risks, comprehensive identification of shadow IT activity leveraging tools such as DPI is necessary, in developing the right policies and approaches to managing the continuous rise of shadow IT across today’s enterprises.

    Blog post Score: 5

  4. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 4

  5. DPI-enhanced CASB for tighter security in the cloud

    As a middleman negotiating traffic flows between users on the ground and applications in the cloud, the importance of the cloud access security broker (CASB) continues to grow. But to be able to provide real-time insights, end-to-end visibility and accurate detection of threats and anomalies, DPI engines such as R&S®PACE 2 are a critical addition. By combining the capabilities of both the CASB and DPI, enterprises are sure to be safe as they move their work to the cloud.

    Blog post Score: 3

  6. Barracuda firewalls rely on R&S®PACE 2

    Barracuda’s cloud-ready firewalls use the deep packet inspection (DPI) engine R&S®PACE 2 to achieve reliable application visibility. This allows them to control network traffic and to facilitate the secure delivery of critical cloud business applications.

    Case Study Score: 1

  7. Webinar: Eliminating cybersecurity blind spots with DPI

    This webinar, produced in collaboration with Barracuda Networks, will review the hidden cyber security threats that Service Provides and enterprises need to combat.
    Dr. Klaus Gheri, Vice President for Network Security with Barracuda Networks, will discuss the new challenges of securing enterprise cloud access and the critical role that DPI has to play within Barracuda's network security solutions.

    Webinar Score: 1

  8. Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI Software Features New Classification for Stratum Mining Protocol

    The new Stratum protocol classification functionality enhances network analytics and security solutions to identify potentially malicious mining activity. This enables enterprises to identify, control and block the network-based cryptocurrency mining.

    Press release Score: 0

  9. Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

    The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

    Press release Score: 0

  10. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0