Search results
-
Networks can’t afford lockdowns: Identifying cyber-threats before they become endemic
The sudden increase in cyber-attacks during the pandemic can mostly be attributed to the unexpected shift to remote working, which caused delays in the deployment of security projects as IT teams struggled with overloaded VPNs and a host of personal devices that needed to be patched remotely. Just last month, US cybersecurity firm FireEye was hit by what it suspects to be state-sponsored cyber-attackers looking to steal information on FireEye’s government clients. How did it happen and how could it have been mitigated? Read more in our latest blog post by Stephan Klokow.
Blog post
-
Saving every heartbeat: How DPI helps secure IoT networks for healthcare
IoT healthcare devices lacking relevant data protocols and standards become easy targets for cyber-attacks. This risk is indefinitely higher with legacy healthcare equipment that cannot be or is not updated to present security standards. This article takes a look at the importance of securing IoT networks and systems against cyber-threats. It lays out the vulnerabilities of present-day IoT networks and systems and highlights how real-time traffic intelligence can mitigate them.
Blog post
-
Maximizing the potential of ZTNA with deep packet inspection
In today’s hybrid enterprise environments, zero-trust network access (ZTNA) is becoming increasingly important to improve the end-user experience while ensuring that the network is secured against attacks and malicious activities. This is possible with next-generation DPI software. DPI supports ZTNA in implementing granular, user- and context-aware authentication across different classes of users, devices, clouds and applications. DPI’s ability to identify traffic anomalies can also be used by ZTNA to identify cyberattacks and other threats on enterprise networks.
Blog post
-
Nowhere to hide: Using deep packet inspection for threat detection
Sudden changes in application speeds and latencies can indicate a cyberattack. This article discusses how threat detection can be augmented with deep packet inspection. It looks at how granular, application-level and service-level insights from DPI can be built into an enterprise’s threat detection system for highly accurate and reliable identification of malicious, suspicious and anomalous traffic.
Blog post
-
Data loss prevention: Risk and reputation management with real-time visibility
To implement data loss prevention (DLP) successfully, organizations must have an in-depth understanding of their business nature, data, transactions, digital assets, endpoints, connectivity, access privileges and existing security policies. This article discusses the need for data loss prevention (DLP) in response to the prevalence of data breaches, infiltration, espionage and data destruction affecting organizations today. It highlights the role of deep packet inspection (DPI) in providing real-time detection of cyber-threats and traffic anomalies and as a means to identify, manage and block both external and insider threats before data security is compromised.
Blog post
-
How advanced traffic identification complements honeypot networks
Honeypot networks are fake IT systems used to bait cyberattackers, learn from them and consequently improve actual cybersecurity. They are designed with a well-placed vulnerability to attract hackers. Once a hacker is in the network, the honeypot allows for monitoring and analyzing the malicious activity. For such networks, deep packet inspection is a great asset. It identifies malicious activity almost instantaneously, helping honeypot networks to detect threats as soon as they enter the network.
Blog post
-
Aricent and Rohde & Schwarz Cybersecurity unveil a unique bandwidth control solution to enhance customer experience for mobile operators and network equipment providers
Aricent Traffic Detection Function (TDF) provides communication service providers an opportunity to capitalize on analytics for traffic optimization, charging and content manipulation, working hand in hand with the policy management system.
Press release
-
Rohde & Schwarz Cybersecurity and Arkessa launch solution for IoT connectivity and security
The multi-level IoT platform solution provides full visibility and control of enterprises’ IoT operations with secure, backdoor-free, globally managed IP connectivity.
Cambridge, United Kingdom/ Leipzig, Germany – June 14, 2017 – Rohde & Schwarz Cybersecurity, a leading IT security provider, and Arkessa, a leading M2M managed services provider, today announced the launch of a joint multi-level IoT platform solution. It unlocks the full potential of IoT by enabling secure interactions across digital ecosystems of devices, people and systems.Press release
-
DNS Tunneling Detection Feature of Rohde & Schwarz Cybersecurity’s Network Traffic Analysis Software Eliminates Weak Spots of Firewalls to Preserve Security
The OEM deep packet inspection software R&S PACE 2 now improves the reliability and credibility of network protection solutions. When embedded in a firewall, malicious attacks that bypass common security policies via DNS tunneling can be identified and prevented.
Press release
-
Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic
The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.
Press release