Search results
-
Cryptocurrency and DPI: Unearthing threats in the blockchain world
Crypto transactions can significantly strain modern networks given their growth, intensity and susceptibility to mass-scale attacks. Also, using encryption to anonymize cryptocurrency transactions creates huge gaps in traffic observability. Find out how the capabilities of DPI in identifying crypto protocols and applications help network operators and security vendors secure networks and devices while protecting the platforms transacting and storing cryptocurrencies.
Blog post
-
Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic
The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.
Press release
-
Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI Software Features New Classification for Stratum Mining Protocol
The new Stratum protocol classification functionality enhances network analytics and security solutions to identify potentially malicious mining activity. This enables enterprises to identify, control and block the network-based cryptocurrency mining.
Press release
-
GITEX technology week 2020 in Dubai
Meet with our team of experts at stand Z2-1, Zabeel Hall 2 and discover how R&S can help your organization be ahead of 5G by driving innovation and creating value in the entire 5G network technology lifecycle. Discover how to manage the ever-increasing network traffic efficiently and ensure the best connectivity and highest security with the DPI software R&S®PACE 2 from ipoque. Schedule a meeting with our DPI expert John Hallett.
Date: 6-10 Dec 2020
Location: DUBAI WORLD TRADE CENTRE + virtuallyEvent
-
DPI for 6G: Ubiquitous connectivity needs ubiquitous visibility
The arrival of 6G may take a few more years, but operators need not wait that long to develop their network intelligence capabilities. This article discusses how network intelligence and visibility needs will change in 6G and how DPI supports these needs. It looks at SAGIN, key features of 6G and areas where real-time granular insights from DPI can be used to manage and secure 6G networks.
Blog post
-
Building trust and security for 6G networks with DPI
Distributed AI, intelligent edge and intelligent RAN are some of 6G’s prime characteristics. Managing 6G security requires deep packet inspection for real-time insights on new and emerging threat patterns arising from vulnerabilities of a new architecture, an expanded network surface and the rapid proliferation of end nodes. With DPI, operators can implement application-aware security policies for high-performant, reliable and trustable 6G networks.
Blog post
-
Protecting digital assets: How DPI-driven digital rights management ensures secure monetization
How can DRM tools stay ahead in an era of multiscreen trends, OTT apps, and growing cybersecurity challenges? Our latest article dives into the game-changing role of deep packet inspection (DPI) and encrypted traffic intelligence (ETI). Discover how these technologies empower DRM solutions to monitor content movement, enforce access controls, and combat piracy, all while enabling seamless management of digital assets and marketplaces. Read more to see how industry giants like Apple, Netflix, and Amazon are safeguarding their content.
Blog post