Search results

  1. DPI for SASE

    Use Case

  2. DPI supporting SASE for 5G security

    SASE is a secure gateway at the edge of a network, bundling network and security functions provided on-demand as a cloud service. DPI can augment the capacities of SASE in securing enterprise 5G networks. This article examines the need for highly reliable and seamless authentication of remote users and endpoints at the edge and explains how DPI in SASE provides the real-time traffic visibility and traffic filtering to enable this.

    Blog post

  3. SASE: Conquering the ever expanding enterprise edge

    Secure Access Service Edge (SASE) is a network architecture that allows enterprises to securely connect remote users and devices to the enterprise-wide area network(WAN). SASE essentially combines ‘network-as-a-service’ with ‘security-as-a-service’ to provide enterprises, especially those with a growing number of edge connections covering branches, mobile workers, remote workers and IoT devices, the means to monitor, manage and secure their enterprise networks and assets. If SASE will be the crucial architecture for securing and managing the ever-expanding enterprise perimeter, deep packet inspection is the logical complement, providing real-time intelligence at every point along the way.

    Blog post

  4. Cloud, SaaS and SASE – Three reasons why DEM needs DPI

    Users want fast and seamless access to any application they need, with productivity hinging on how well these applications are delivered, regardless of whether they are corporate, cloud or SaaS applications. As such, Digital experience monitoring (DEM) will increasingly enter the focus of all enterprises, which means the need for traffic visibility provided by advanced DPI engines such as R&S®PACE 2 will continue to rise.

    Blog post

  5. Webinar: Powering SD-WAN and SASE with next-gen DPI for fast-performing SDx services

    The increasing adoption of cloud and IoT, a growing remote workforce and the proliferation of new forms of cyber threats are pushing service providers to continuously improve and adapt their connectivity offerings to the needs of today’s enterprises. In this webinar you will learn how the integration of our next-gen DPI engine R&S®PACE 2 powers BBT.live’s SD-WAN and SASE solution for service providers in delivering secure network connectivity.

    Webinar

  6. VPN and visibility: the paradox of secure networking

    Secure connectivity provided by Virtual Private Networks (VPNs) enables enterprises to keep their users connected to enterprise resources. Real-time insights into VPN traffic help enterprises manage not just their own VPN services, but also third-party VPN traffic traversing their networks. This blog post discusses how deep packet inspection (DPI) delivers these insights and how enterprises can use these insights for enhanced performance and security of their networks.

    Blog post

  7. Accelerating traffic with DPDK-optimized DPI

    DPDK plays a pivotal role in modern networks by elevating packet processing rates, minimizing latencies, and enhancing network speeds. In this article, we delve into the synergy of deep packet inspection (DPI) and the Data Plane Development Kit (DPDK) to amplify packet processing capabilities in both networking and cybersecurity contexts. We will examine the intricate mechanisms harnessed by DPDK and underscore the indispensable role of DPDK-optimized visibility tools like R&S®PACE 2, especially when dealing with applications operating in high-compute environments.

    Blog post

  8. Next-gen deep packet inspection software

    Page

  9. DPI engine R&S®PACE 2

    Product

  10. Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic

    The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.

    Blog post