Search results

6 results for: "ransomware"


  1. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post Score: 1

  2. Rohde & Schwarz Cybersecurity and Saint Security Fight Virus and Malware With Artificial Intelligence-Based Advanced Threat Protection Solution

    Saint Security uses Rohde & Schwarz Cybersecurity’s deep packet inspection (DPI) software R&S PACE 2 in its network-based advanced malware response solution MNX to identify, analyze, judge and block malicious activity. By embedding the DPI engine, they unlock the full potential of Artificial Intelligence-based (AI) analysis methodologies to fingerprint sophisticated cyber-attacks.

    Press release Score: 0

  3. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0

  4. SASE: Conquering the ever expanding enterprise edge

    Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

    Blog post Score: 0

  5. vCPE and uCPE: How much cloud do we really need?

    CPE virtualization abolishes proprietary hardware, vendor lock-in, congested rack space and expensive on-site maintenance. How has the cloud transformed CPE and what are the CPE deployment models that best fit today’s diverse traffic? This blog post discusses virtualized CPE (vCPE) and universal CPE (uCPE) in the context of how DPI enables the development of network architectures that are aligned to today’s traffic needs. It illustrates in detail how deep intelligence on traffic and applications enables the optimization of CPE architecture covering options that include on-premises, data center and cloud deployments and the assessment of these options in terms of overall cost, network efficiency and application performance.

    Blog post Score: 0

  6. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0