Search results

  1. Encrypted traffic intelligence for network traffic analysis

    Encryption greatly enhances the security and privacy of data. However, it introduces new challenges in terms of network monitoring and security, as it gives networks only limited visibility into the underlying traffic flows. To reinstate IP network traffic visibility, ipoque has enhanced its deep packet inspection technology with encrypted traffic intelligence (ETI) for accurate and highly reliable, real-time analysis of encrypted traffic. ETI complements ipoque’s market-leading traffic identification and classification methodologies and metadata extraction to deliver granular visibility for protocols, applications and services that are encrypted.

    Brochure

  2. The downside to decryption and why you need encrypted traffic intelligence

    Often, networks run millions of decryption and re-encryption loops that come with various security, latency and performance implications. In our latest blog, we discuss the downside of decryption in traffic analysis, and how ipoque’s encrypted traffic intelligence (ETI) can be used to tackle even the most stringent encryption protocols without decrypting a single packet!

    Blog post

  3. Product demo: Next-gen DPI with encrypted traffic intelligence

    Keeping up with the continuous advancements in encryption presents a challenge for deep packet inspection in providing real-time insights on IP traffic. However, to maintain network functionalities that depend on immediate detection, DPI must incorporate additional techniques capable of identifying encrypted, obfuscated, and anonymized traffic. Discover how machine learning and deep learning can complement DPI to deliver encrypted traffic visibility.

    Webinar

  4. Encrypted traffic intelligence to become a crucial feature of next-gen DPI solutions, says research report

    Leipzig, Germany — March 15, 2023 — ipoque GmbH, a Rohde & Schwarz company and a leading provider of next-gen deep packet inspection (DPI) software, today unveils the findings of its latest research report that investigates the evolution of deep packet inspection (DPI) technologies against the growth of encrypted traffic across today’s IP networks. The first-ever report on encryption that is based on the views of leading networking vendors finds a strong demand for next-generation DPI solutions that feature encrypted traffic intelligence.

    Press release

  5. Powering next-gen firewalls with DPI and encrypted traffic intelligence

    In response to the challenges posed by advanced encryption protocols and increasing cybersecurity threats, LANCOM has integrated the AI-powered R&S®PACE 2 DPI engine into its next-gen firewalls. This enhancement enables real-time application filtering and advanced threat detection, even in encrypted traffic. As a result, LANCOM R&S®Unified Firewalls deliver improved visibility, security and performance for enterprise networks. Read our case study to find out how this partnership strengthens the network in versatile manners.

    Case Study

  6. QUIC: How DPI with encrypted traffic intelligence supports the web’s latest protocol

    QUIC is a network layer protocol that uses the UDP protocol and TLS-based encryption to deliver web traffic between devices. This article discusses the visibility challenges introduced by QUIC and the impact of this on traffic management and security. It also assesses how deep packet inspection (DPI) with encrypted traffic intelligence (ETI) addresses these challenges and powers networking and cybersecurity tools against the rapid growth of QUIC traffic.

    Blog post

  7. Accelerating and securing mobile networks – The role of software acceleration in DPI and encrypted traffic intelligence

    Navigating the complexities of 5G-Advanced requires robust solutions! The surge in mobile network demands poses challenges in user experience, traffic prioritization, and cybersecurity. Deep packet inspection and encrypted traffic intelligence emerge as critical tools. Discover how how a software-centric shift, coupled with vector-based acceleration techniques like FD.io VPP and DPDK Graph library enhances the efficiency of DPI and ETI for the evolving landscape of 5G networks.

    Blog post

  8. TLS 1.3, ESNI, ECH and QUIC: Taming new age cryptography with DPI and AI/ML-based encrypted traffic intelligence

    Complex encryption protocols often lead to huge gaps in traffic visibility. This article explores the latest encryption protocols, such as TLS 1.3, DoX and ESNI, and how progressive erosion of traffic information, such as handshake and packet payload data, impact traditional DPI. It looks at how AI-based techniques, including machine learning and deep learning, tackle these protocols and why next-gen DPI is a must for modern networks.

    Blog post

  9. Powering network analytics with machine learning & AI

    From energy grids to advanced smart cities, from space travel to military missions: data-dependent industry verticals need real-time network traffic analytics to manage the growing number of encrypted applications and services. In this article, we discuss the integration of artificial intelligence (AI) and machine learning (ML) into network analytics, with a particular focus on the challenges posed by encryption and how these technologies improve visibility and understanding of network traffic. Explore the essential shift to next-gen DPI for a compelling journey in network analytics.

    Blog post

  10. How DPI unravels Scramble Transform and mitigates QUIC’s latest visibility challenges

    In an increasingly encrypted digital landscape, QUIC's recent Scramble Transform introduces significant visibility challenges for network security. Our latest blog post explores the rising adoption of QUIC in HTTP/3-based applications and examines how the IETF's 2024 implementation of Scramble Transform exacerbates existing visibility issues. Discover how next-gen DPI technology can enhance traffic transparency and protect your applications from emerging threats while addressing these challenges

    Blog post