Search results

49 results for: "enterprise security"


  1. Rohde & Schwarz Cybersecurity DPI Solution Enables Security and Traffic Control of Critical Enterprise Cloud Applications

    Barracuda’s cloud-ready firewalls utilize the deep packet inspection (DPI) engine R&S PACE 2 to achieve reliable application visibility which allows for controlling network traffic and facilitating the secure delivery of critical cloud business applications.

    Press release Score: 12

  2. Info sheet: NAT transparency plug-in for enterprise IT security

    The NAT tethering transparency plug-in by ipoque is an essential software tool for enterprises that reliably want to detect unauthorized NATing devices and secure their networks.

    Brochure Score: 11

  3. Bringing shadow IT out of the dark with DPI-driven traffic awareness

    The usage of unofficial, external applications and devices by employees in their normal course of work is growing. While this drives innovation and efficiency across various tasks, it poses a number of security and operational risks to the enterprise. To retain the gains while curtailing the risks, comprehensive identification of shadow IT activity leveraging tools such as DPI is necessary, in developing the right policies and approaches to managing the continuous rise of shadow IT across today’s enterprises.

    Blog post Score: 5

  4. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 4

  5. Barracuda Firewalls rely on R&S®PACE 2

    Barracuda’s cloud-ready firewalls utilize the deep packet inspection (DPI) engine R&S®PACE 2 to achieve reliable application visibility, which allows for controlling network traffic and for facilitating the secure delivery of critical cloud business applications.

    Case Study Score: 1

  6. Webinar: Eliminating cybersecurity blind spots with DPI

    This webinar, produced in collaboration with Barracuda Networks, will review the hidden cyber security threats that Service Provides and enterprises need to combat.
    Dr. Klaus Gheri, Vice President for Network Security with Barracuda Networks, will discuss the new challenges of securing enterprise cloud access and the critical role that DPI has to play within Barracuda's network security solutions.

    Webinar Score: 1

  7. Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI Software Features New Classification for Stratum Mining Protocol

    The new Stratum protocol classification functionality enhances network analytics and security solutions to identify potentially malicious mining activity. This enables enterprises to identify, control and block the network-based cryptocurrency mining.

    Press release Score: 0

  8. Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

    The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

    Press release Score: 0

  9. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0

  10. SASE: Conquering the ever expanding enterprise edge

    Secure Access Service Edge (SASE) is a network architecture that allows enterprises to securely connect remote users and devices to the enterprise-wide area network(WAN). SASE essentially combines ‘network-as-a-service’ with ‘security-as-a-service’ to provide enterprises, especially those with a growing number of edge connections covering branches, mobile workers, remote workers and IoT devices, the means to monitor, manage and secure their enterprise networks and assets. If SASE will be the crucial architecture for securing and managing the ever-expanding enterprise perimeter, deep packet inspection is the logical complement, providing real-time intelligence at every point along the way.

    Blog post Score: 0