Search results

100 results for: "nat"


  1. Webinar: Eliminating cybersecurity blind spots with DPI

    This webinar, produced in collaboration with Barracuda Networks, will review the hidden cyber security threats that Service Provides and enterprises need to combat.
    Dr. Klaus Gheri, Vice President for Network Security with Barracuda Networks, will discuss the new challenges of securing enterprise cloud access and the critical role that DPI has to play within Barracuda's network security solutions.

    Webinar Score: 10

  2. Cloud native networks: gearing up for an agile future

    At one time, businesses were content deploying their own IT infrastructure, adding more hardware and appliances as transactions and operations grew. They then saw the limitations of proprietary hardware in scaling growth and saw how cloud and virtualization gave them the computing resources they needed to deploy and run their applications on a flexible, on-demand model. Efficiency gains however, are not the only push factors for the adoption of cloud-native networks.

    Blog post Score: 9

  3. Info sheet: NAT transparency plug-in for enterprise IT security

    The NAT tethering transparency plug-in by ipoque is an essential software tool for enterprises that reliably want to detect unauthorized NATing devices and secure their networks.

    Brochure Score: 8

  4. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 7

  5. Info sheet: NAT/mobile tethering transparency plug-in to uncover mobile tethering fraud

    The NAT/mobile tethering transparency plug-in by ipoque is an essential software tool to reveal devices behind a NATing device and uncover mobile tethering fraud in a specific network. By integrating the deep packet inspection software (DPI) R&S®PACE 2 together with our NAT/mobile tethering transparency plug-in, solution manufacturers focusing on visibility for fixed and mobile carrier networks can reliably detect unauthorized devices using NAT.

    Brochure Score: 7

  6. Rohde & Schwarz launches NAT/ mobile tethering transparency plug-in for analytics market

    Leipzig, Germany — February 19, 2020 — Today, ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, announced that they have launched an easy-to-integrate software plug-in for network address translation (NAT) detection and mobile tethering transparency suitable for analytics and cybersecurity vendors. The plug-in in combination with the leading OEM DPI software R&S®PACE 2 detects NATing and devices behind the corresponding routing device, as well as the applications used.

    Press release Score: 6

  7. Winning in an app-centric world: How DPI’s latest traffic signatures keep networks ahead of the game

    What are the latest trends in apps and what's the impact of app traffic on the security and management of IP networks? TikTok, Facebook, WhatsApp, Facebook Messenger, Instagram and Zoom have become absolutely essential for everyone, especially with the outbreak of the pandemic. How do network operators manage this increased app traffic? Read about the importance of frequently updated signature libraries for DPI in managing app traffic.

    Blog post Score: 6

  8. DNS Tunneling Detection Feature of Rohde & Schwarz Cybersecurity’s Network Traffic Analysis Software Eliminates Weak Spots of Firewalls to Preserve Security

    The OEM deep packet inspection software R&S PACE 2 now improves the reliability and credibility of network protection solutions. When embedded in a firewall, malicious attacks that bypass common security policies via DNS tunneling can be identified and prevented.

    Press release Score: 3

  9. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post Score: 2

  10. Whitepaper: SD-WAN and DPI

    The SD-WAN market is growing fast, but so is competition. In such a competitive environment, SD-WAN vendors need to offer products with unique features and capabilities in order to stand out. Real-time application visibility powered by deep packet inspection (DPI) software can be the decisive element in achieving them.

    Whitepaper Score: 1