Search results

  1. Complementing WiFi 6 technologies with DPI intelligence to make the best of both worlds

    WiFi 6 provides the technical possibilities for enhancing the robustness, speed and security of ubiquitously networked computing. Deep packet inspection, in turn, improves the data foundation on which the technical capabilities of WiFi 6 are used. WiFi 6 and DPI are both useful on their own, but together, they function as complements that provide a real boost to any WLAN data network.

    Blog post

  2. DPI for SD-WAN solutions

    Use Case

  3. DPI for firewalls

    Use Case

  4. Next-gen deep packet inspection software

    Page

  5. License next-generation DPI software from an expert, use open-source DPI or build an own DPI solution?

    Page

  6. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post

  7. The importance of SD-WANs and the need for application awareness

    Page

  8. Enhancing network visibility for SD-WAN in the era of cloud and SaaS

    One of the most touted benefits of SD-WAN is the execution of network policies via dynamic provisioning of network services such as firewalls, load balancers and session controllers. With SD-WAN, centrally controlled orchestrators can now control network functions remotely, allowing network services to respond instantaneously to the type of application that is being delivered. However, to respond to the demands of the traffic and dynamically provision network services by application types, networks require network visibility through application awareness. Identifying an application, its attribute or its application family allows networks to become intelligent enforcing corresponding policies.

    Blog post

  9. How COVID-19 became the tipping point for enterprise digital revolution

    Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

    Blog post

  10. Video streaming: networks and the game of bandwidth

    It is evident that video streaming is on a fast track to becoming the new definition of the ‘Internet’, easily outdoing other bandwidth-intensive applications such as cloud gaming, augmented reality (AR) and virtual reality (VR). The demand for video content seems to move in tandem with network speeds, given that better speeds translate into faster streaming and improved quality of experience (QoE). One of the immediate effects of a rapid increase in video traffic is the strain it puts on network resources, resulting in network congestion and poor network performance. While this impairs almost all applications to some degree, video takes the biggest hit given its dependency on real-time availability of bandwidth and speeds. What operators need now are the right tools that deliver the required intelligence, timely and accurately, to maintain the required QoE and to successfully deploy their video streaming strategies.

    Blog post