Search results

8 results for: "ransomware"


  1. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post Score: 2

  2. Rohde & Schwarz Cybersecurity and Saint Security Fight Virus and Malware With Artificial Intelligence-Based Advanced Threat Protection Solution

    Saint Security uses Rohde & Schwarz Cybersecurity’s deep packet inspection (DPI) software R&S PACE 2 in its network-based advanced malware response solution MNX to identify, analyze, judge and block malicious activity. By embedding the DPI engine, they unlock the full potential of Artificial Intelligence-based (AI) analysis methodologies to fingerprint sophisticated cyber-attacks.

    Press release Score: 0

  3. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post Score: 0

  4. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0

  5. vCPE and uCPE: How much cloud do we really need?

    CPE virtualization abolishes proprietary hardware, vendor lock-in, congested rack space and expensive on-site maintenance. How has the cloud transformed CPE and what are the CPE deployment models that best fit today’s diverse traffic? This blog post discusses virtualized CPE (vCPE) and universal CPE (uCPE) in the context of how DPI enables the development of network architectures that are aligned to today’s traffic needs. It illustrates in detail how deep intelligence on traffic and applications enables the optimization of CPE architecture covering options that include on-premises, data center and cloud deployments and the assessment of these options in terms of overall cost, network efficiency and application performance.

    Blog post Score: 0

  6. SASE: Conquering the ever expanding enterprise edge

    Secure Access Service Edge (SASE) is a network architecture that allows enterprises to securely connect remote users and devices to the enterprise-wide area network(WAN). SASE essentially combines ‘network-as-a-service’ with ‘security-as-a-service’ to provide enterprises, especially those with a growing number of edge connections covering branches, mobile workers, remote workers and IoT devices, the means to monitor, manage and secure their enterprise networks and assets. If SASE will be the crucial architecture for securing and managing the ever-expanding enterprise perimeter, deep packet inspection is the logical complement, providing real-time intelligence at every point along the way.

    Blog post Score: 0

  7. Harnessing intelligence at the core with DPI for vEPC

    The shift from an EPC to a vEPC opens up the possibility for networks to manage capacities as needed while scaling and customizing the network dynamically based on traffic conditions and application requirements. What’s the role of deep packet inspection (DPI) in creating these highly responsive, scalable and agile 4G networks? This article discusses the need for DPI-powered intelligence in the vEPC as DPI provides real-time traffic insights on applications, protocols, traffic attributes, malware and other data required to implement traffic management, security and content management policies, not only across the core but also throughout the network.

    Blog post Score: 0

  8. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0