Search results

  1. Better together: How the DPI software R&S®PACE 2 helps Celare to set themselves apart from the competition

    The company Celare, founded in May 2012 and one of my key customers from Israel, evolved into a leading network security company with a broad cybersecurity portfolio for various markets. To find out more about their success, and how they set themselves apart from the competition with our advanced DPI engine R&S®PACE 2, I talked to Sharon, my key contact and CTO at Celare.

    Blog post

  2. DPI-driven application and protocol classification

    As the internet is at the center of more and more business, application awareness will be needed even more to enable optimal distribution of network content. New and intensified security threats will emerge as business and commerce virtualize. This article discusses how an advanced DPI engine featuring port-based matching, pattern matching and encrypted traffic intelligence can enhance the monitoring performance, security and monetization of networks.

    Blog post

  3. Customer insights

    Page

  4. Our service promise

    Page

  5. DPI for vEPC/ 5G core vendors

    Use Case

  6. About us | From network data to intelligence

    Page

  7. Mobile tethering detection plug-in

    Introducing the mobile tethering detection plug-in: This extension of R&S®PACE 2 DPI engine identifies tethering or hotspot devices through advanced IP traffic analysis methods. Ideal for network solution manufacturers prioritizing network visibility, it detects unauthorized tethered devices reliably. Explore how this plug-in reveals tethering or hotspot devices in any network.

    Brochure

  8. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post

  9. GTP correlation for traffic management

    Use Case

  10. Facebook, YouTube and Instagram: Tackling app frenzy with DPI-driven application awareness

    It goes without saying that applications are driving today's networks. The rapid growth of application traffic and global trends in application usage are the focus of this article. In particular, it explores the role of deep packet inspection in providing the granular application visibility needed to ensure network performance, allocating network assets, managing application-related threats, and providing superior user satisfaction.

    Blog post