Search results

117 results for: "network security"


  1. Whitepaper: Why network security requires deep packet inspection

    What is needed to identify, investigate and block attacks in this ever-changing threat landscape? The answer is deep visibility into network traffic, up to the application layer and beyond, as provided by the advanced OEM DPI engine R&S®PACE 2. For network security vendors to help customers effectively block and mitigate threats, this visibility is a critical prerequisite for the stability and reliability of modern cybersecurity solutions.

    Whitepaper Score: 19

  2. Keeping containers and pods safe in the cloud: How network visibility helps

    The architecture of microservices often results in an expanded attack surface of cloud-native applications. However, security risks and vulnerabilities inherent in container environments can be mitigated using real-time packet visibility. Find out more about the role of deep packet inspection (DPI) for container network security in the context of microservices and cloud-native applications.

    Blog post Score: 14

  3. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 11

  4. How advanced traffic identification complements honeypot networks

    Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

    Blog post Score: 11

  5. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 11

  6. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post Score: 10

  7. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post Score: 10

  8. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 10

  9. Bringing shadow IT out of the dark with DPI-driven traffic awareness

    The usage of unofficial, external applications and devices by employees in their normal course of work is growing. While this drives innovation and efficiency across various tasks, it poses a number of security and operational risks to the enterprise. To retain the gains while curtailing the risks, comprehensive identification of shadow IT activity leveraging tools such as DPI is necessary, in developing the right policies and approaches to managing the continuous rise of shadow IT across today’s enterprises.

    Blog post Score: 10

  10. Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

    The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

    Press release Score: 9