Resources: Brochures

  • Solution Guide DPI Engine as an OEM Solution

    R&S®PACE 2 - Protocol & Application Classification Engine


    R&S®PACE 2 is integrated by network equipment and security vendors to enhance their products with state-of-the-art protocol and application awareness capabilities. Designed by developers with years of experience in Layer 7 protocol and application awareness, R&S®PACE 2 can be deployed in a variety of use cases including Network Security (IDS/IPS, Next Generation Firewalls, SIEM, (UTM), Network Monitoring and Traffic Management, Policy and Charging, Application Delivery and Optimization, Analytics, and Mobile Data Offload.

  • Product Brochure DPI Engine Benefits & Key Features

    R&S®PACE 2 - Protocol & Application Classification Engine


    R&S®PACE 2 is a software library that uses different technologies – deep packet inspection, behavioral, heuristic and statistical analysis – to reliably detect network protocols and applications, even if they use advanced obfuscation and encryption techniques, and extract metadata in realtime. R&S®PACE 2 is used by network equipment and security vendors to enhance their products with state-of-the-art protocol and application awareness capabilities to deliver full visibility into IP-based network traffic.

  • Product Brochure Traffic Analytics Solution

    R&S®Net Reporter 2 - Actionable Intelligence for Network Operators

    net reporter

    Today’s mobile networks provide a wealth of data. The challenge for network operators is to turn this raw data into valuable and actionable information that enables them to make educated business decisions on topics like new data plans, network planning, content optimization, subscriber experience and peering agreements.

  • Advisory Guide on Build vs. Buy DPI

    Making the Right Decision

    Image - Brochure - makeorbuy

    When your network solution needs DPI application awareness, choosing to build it in-house or to license the software from a DPI specialist can be a difficult decision that is challenging many organizations of all sizes. The answer is not as easy as simply comparing costs, because key elements can be overlooked, strategic decisions may be omitted and hidden costs might be missed.
    This free advisory guide summarizes the pros and cons of building or buying DPI Software that you should not ignore before choosing to either develop your own solution or going to the market.

  • Solution Flyer Advanced Threat Detection

    detect known and unknown threats

    Image - Brochure - Napatech

    Rohde & Schwarz Cybersecurity and Napatech help you meet today’s security challenges with deepest insights. There is no single method for protecting a computer network against today’s cyberattacks successfully. This is why security teams need a defense in depth approach using multiple security layers which reduces the risk of a successful and costly attack on networks. The basic prerequisite for defense in depth is fine-grained, highquality and fully available data.

  • Product Brochure IP Probe

    R&S®Net Sensor - IP Application Classification Probe for Network Operators


    R&S®Net Sensor is designed to passively probe mobile, fixed and converged networks at full line speed. The classification results together with the control plane data (e.g.: GTP-C, RADIUS, DHCP) are reliably communicated to the storage, analytics and reporting systems for further processing and correlation.

  • Study Industry 4.0

    Study by IDG and Rohde & Schwarz Cybersecurity

    Image - Secure DL - IDG Studie

    IT meets OT – there is little doubt that with information technology and operation technology two different worlds meet in Industry 4.0. The Industrial Internet of Things (IIoT) and the growing amount of connected devices bring both new opportunities and new security risks.

  • Solution Flyer Multi-level IoT Platform

    IoT Security and Connectivity

    Casestudy - Arkessa

    The Internet of Things (IoT) continues to expand rapidly and poses significant network connectivity and security risks. The scale of deployment for connected endpoints and devices is unprecedented and creates unique new challenges for the IoT ecosystem, including carriers and network operators. Arkessa and Rohde & Schwarz Cyber­security have joined forces to offer a multi-level IoT platform solution to help you take control of all your IoT operations.

  • Solution Flyer Secure Automotive Telematics Platforms

    Challenges & Solutions

    Image - Brochure - Secure Automotive

    Security concerns remain the number one inhibitor to IoT monetization by operators. To leverage the advantages of the first movers, operators have to invest in dedicated security while telematics and vehicle security still mature.

    The Security Challenge Mobile operators have become the natural partner to car manufacturers in offering IoT-based telematics services. Operators monetize vehicle data as collected by telematics platforms in a variety of use cases, such as: