Search results

21 results for: "threat detection"


  1. Rohde & Schwarz Cybersecurity and Napatech Launch Advanced Network Threat Detection Solution at Black Hat Europe 2017

    The solution combines a real-time intrusion detection system and network traffic recording capabilities to detect known and unknown cyber threats early on

    Press release Score: 8

  2. How advanced traffic identification complements honeypot networks

    Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

    Blog post Score: 2

  3. Orsec Technologies SAS embeds R&S®PACE 2

    "The content and metadata extracted from traffic flows by the DPI engine R&S®PACE 2 provides a rich information feed we use to boost our machine learning for user and device behavior analytics. This empowers our solution to [...]

    Success Story Score: 2

  4. DPI-powered machine learning for network monitoring software

    Protecting your company’s information from data breaches is an ever-present security concern, all the more serious for small and medium companies who cannot afford a dedicated IT security team. oorigin® by Orsec Technologies incorporates the analytics capabilities of R&S®PACE 2 for a faster and more efficient detection of cyberthreats.

    Case Study Score: 2

  5. Orsec Technologies boosts next-generation intelligence solution with DPI by Rohde & Schwarz

    Leipzig, Germany – May 22, 2019 – ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, today announced that Orsec Technologies SAS has licensed its DPI engine R&S®PACE 2 for their cyber threat hunting solution oorigin®. Providing accurate traffic analytics and a rich set of metadata in real time, R&S®PACE 2 significantly strengthens Orsecs threat hunting capabilities. This allows for more accurate alerts, faster threat detection and enhanced machine learning.

    Press release Score: 0

  6. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post Score: 0

  7. Indigo Software embeds R&S®PACE 2

    “We had evaluated open-source alternatives as the core for our web application firewall; however they did not offer the performance and reliability required for our customers. The Rohde & Schwarz DPI engine R&S®PACE 2 gave us what we needed [...].”

    Success Story Score: 0

  8. New SCADA decoder protecting M2M communication from malicious code now available from Rohde & Schwarz and CELARE

    Leipzig, Germany, November 14th, 2016 – Machine to machine (M2M) communication, which is increasingly important due to the Internet of Things (IoT), needs to be protected from hidden malicious code. The SCADA decoder available as part of R&S PACE 2 is now featured in CELARE’s innovative T-SENSE product and offered to industrial plant owners for the protection of their data network infrastructure.

    Press release Score: 0

  9. Uncovering hidden devices: using DPI to deliver NAT transparency for enterprise networks

    Network address translation (NAT) allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a NAT setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.

    Blog post Score: 0

  10. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post Score: 0