Search results

  1. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post

  2. Saving every heartbeat: How DPI helps secure IoT networks for healthcare

    IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.

    Blog post

  3. Maximizing the potential of ZTNA with deep packet inspection

    In today’s hybrid enterprise environments, zero-trust network access (ZTNA) is becoming increasingly important to improve the end-user experience while ensuring that the network is secured against attacks and malicious activities. This is possible with next-generation DPI software. DPI supports ZTNA in implementing granular, user- and context-aware authentication across different classes of users, devices, clouds and applications. DPI’s ability to identify traffic anomalies can also be used by ZTNA to identify cyberattacks and other threats on enterprise networks.

    Blog post

  4. Nowhere to hide: Using deep packet inspection for threat detection

    Sudden changes in application speeds and latencies can indicate a cyberattack. This article discusses how threat detection can be augmented with deep packet inspection. It looks at how granular, application-level and service-level insights from DPI can be built into an enterprise’s threat detection system for highly accurate and reliable identification of malicious, suspicious and anomalous traffic.

    Blog post

  5. Data loss prevention: Risk and reputation management with real-time visibility

    To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.

    Blog post

  6. How advanced traffic identification complements honeypot networks

    Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.

    Blog post

  7. Rohde & Schwarz and Helmut Schmidt University Hamburg conduct joint research

    Leipzig, Germany – April 15, 2019 – ipoque GmbH, a Rohde & Schwarz company, today announced a strategic research partnership with Helmut Schmidt University in Hamburg to establish a program of exchange and collaboration. The R&S subsidiary provides market-leading network analytics solutions for more secure, reliable and efficient networks. The joint research will focus on artificial intelligence, machine learning and big data analytics and runs for 4 years.

    Press release

  8. Deep packet inspection for threat analysis

    Saint Security uses the deep packet inspection (DPI) engine R&S®PACE 2 in its network-based advanced malware response solution MNX to identify, analyze, judge and block malicious activity.

    Case Study

  9. Rohde & Schwarz launches mobile tethering detection plug-in for analytics market

    Leipzig, Germany — February 19, 2020 — Today, ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, announced that they have launched an easy-to-integrate software plug-in for mobile tethering transparency suitable for analytics and cybersecurity vendors. The plug-in in combination with the leading OEM DPI software R&S®PACE 2 detects tethering and devices behind the corresponding routing device, as well as the applications used.

    Press release

  10. Enhancing network visibility for SD-WAN in the era of cloud and SaaS

    One of the most touted benefits of SD-WAN is the execution of network policies via dynamic provisioning of network services such as firewalls, load balancers and session controllers. With SD-WAN, centrally controlled orchestrators can now control network functions remotely, allowing network services to respond instantaneously to the type of application that is being delivered. However, to respond to the demands of the traffic and dynamically provision network services by application types, networks require network visibility through application awareness. Identifying an application, its attribute or its application family allows networks to become intelligent enforcing corresponding policies.

    Blog post