Search results

  1. DPI for 6G: Ubiquitous connectivity needs ubiquitous visibility

    The arrival of 6G may take a few more years, but operators need not wait that long to develop their network intelligence capabilities. This article discusses how network intelligence and visibility needs will change in 6G and how DPI supports these needs. It looks at SAGIN, key features of 6G and areas where real-time granular insights from DPI can be used to manage and secure 6G networks.

    Blog post

  2. Rohde & Schwarz Cybersecurity DPI Solution Enables Security and Traffic Control of Critical Enterprise Cloud Applications

    Barracuda’s cloud-ready firewalls utilize the deep packet inspection (DPI) engine R&S PACE 2 to achieve reliable application visibility which allows for controlling network traffic and facilitating the secure delivery of critical cloud business applications.

    Press release

  3. CloudGen Firewall from Barracuda relies on DPI engine R&S®PACE 2 from ipoque

    “We are committed to provide award-winning products and excellent support for our customers and partners. This is only possible if our technology partners can live up to the same high expectations and standards. Throughout our entire partnership, we have always felt very well looked after by ipoque, who have always been highly committed to provide a timely solution to any problem.”

    Success Story

  4. Solution guide - Next generation deep packet inspection software

    Next-gen DPI technology from ipoque provides granular insights into IP traffic by detecting protocols, applications and even application attributes and services (for example video, audio, chat or file transfers in a messaging client). Metadata extraction reveals specific information on speed, latency, user locations, jitter, bandwidth consumption, type of devices, etc. With a wide range of traffic classification methods, including port-based matching, pattern matching, behavioral analysis and statistical/heuristic analysis, the ipoque DPI solutions provide more than standard DPI and deliver modern networks with what they need most – intelligence.

    Brochure

  5. Tethering and the lure of data: How to make every byte count

    While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

    Blog post

  6. Enhancing network visibility for SD-WAN in the era of cloud and SaaS

    One of the most touted benefits of SD-WAN is the execution of network policies via dynamic provisioning of network services such as firewalls, load balancers and session controllers. With SD-WAN, centrally controlled orchestrators can now control network functions remotely, allowing network services to respond instantaneously to the type of application that is being delivered. However, to respond to the demands of the traffic and dynamically provision network services by application types, networks require network visibility through application awareness. Identifying an application, its attribute or its application family allows networks to become intelligent enforcing corresponding policies.

    Blog post

  7. How COVID-19 became the tipping point for enterprise digital revolution

    Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

    Blog post

  8. Identifying bestseller strategies: analytics and content monetization for telecom operators

    When it comes to content business for telecom operators, borrowed strategies rarely work because no two markets are the same and no two operators are endowed with similar resources. This blog article discusses telecom operator content strategies and how real-time analytics of traffic flows help them develop, improve and implement these strategies. It assesses in particular, how DPI-driven analytics help in the choice of content and content partnerships, content delivery and pricing models.

    Blog post

  9. Commercial vs open-source DPI: Does it matter?

    Commercial DPI takes traffic detection a notch higher via its ability to detect encrypted and obfuscated traffic. This inherently requires advanced methods such as statistical and behavioral analysis and machine learning, technologies that are not available in the open-source versions. This article debates the advantages of commercial vs. open-source DPI. While it shares the merits of both options, it highlights the reliability, superior performance, efficiency, security and service consistency provided by vendors of commercial DPI and how these qualities help network administrators and managers monitor and secure their networks more effectively.

    Blog post

  10. Not a child's play: tackling online safety with DPI-enhanced parental controls

    Excessive levels of unmonitored online activity among children could lead to cyber-bullying, potentially inappropriate contact with adults or adverse health effects. By implementing comprehensive parental control measures, operators are able to add value to their service plans, deliver a safer experience for customers and boost revenues and customer loyalty in the long run. How does network intelligence provided by DPI enables operators to provide these controls as part of their service?

    Blog post