Search results

  1. Profinet, DNP3, Modbus and BACnet: Using DPI to decode IIoT traffic

    Devil’s Ivy is a chain attack that targets IIoT devices with the aim of infiltrating enterprise networks. Current operational technology (OT) protocols leave IIoT devices vulnerable to such attacks and many other forms of emerging cyber threats. Also, in IIoT, slight lags in the application or cloud performance and minor latencies in last-mile networks can massively impair machines and equipment ground performance. However, these issues can remain undetected for months or even years. DPI tools help in fortifying IIoT networks and securing enterprise production environments

    Blog post

  2. Enhancing mobile experiences: DPI in 5G and 5.5G networks

    As 5G-Advanced (5.5G) enters commercial use, mobile networks will usher vastly improved computing capabilities, enabling operators to boost existing use cases including 5G private networks, UAVs, FWA services and various XR/VR and multi-party, interactive applications. This article discusses how deep packet inspection (DPI) supports the evolution of 5G and 5.5G. It explores how real-time traffic classification information is used to enhance network slicing, cloud computing, edge processing and in-network computing. It also assesses how traffic visibility enhances personalized experiences and optimizes overall network performance.

    Blog post

All results loaded