Search results
-
Mobile tethering detection plug-in
Introducing the mobile tethering detection plug-in: This extension of R&S®PACE 2 DPI engine identifies tethering or hotspot devices through advanced IP traffic analysis methods. Ideal for network solution manufacturers prioritizing network visibility, it detects unauthorized tethered devices reliably. Explore how this plug-in reveals tethering or hotspot devices in any network.
Brochure
-
Tethering and the lure of data: How to make every byte count
While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.
Blog post
-
Rohde & Schwarz launches mobile tethering detection plug-in for analytics market
Leipzig, Germany — February 19, 2020 — Today, ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, announced that they have launched an easy-to-integrate software plug-in for mobile tethering transparency suitable for analytics and cybersecurity vendors. The plug-in in combination with the leading OEM DPI software R&S®PACE 2 detects tethering and devices behind the corresponding routing device, as well as the applications used.
Press release
-
Uncovering hidden devices: using DPI to deliver tethering transparency for enterprise networks
Tethering allows devices in a private network to keep their own private IP addresses yet conceal this information from the public internet for secure and safe networking bringing about security challenges to enterprise networks. With insights on the devices and applications used in a tethering setup, IT administrators can implement better BYOD policies, formalizing unauthorized usages and aligning existing network security measures.
Blog post
-
Rohde & Schwarz Unveils New Features of Deep Packet Inspection Solution for vEPC Market
Leipzig, Germany – January 8, 2019 – ipoque GmbH, a Rohde & Schwarz company providing market-leading deep packet inspection (DPI) software, today announced new R&S®PACE 2 capabilities for the virtualized evolved packet core (vEPC) market. The high-performance DPI product offers vEPC vendors comprehensive signatures for video streaming, breakthrough efficiency, enhanced tethering detection and flexible licensing. Today, three of the five leading vEPC vendors have embedded R&S®PACE 2 in their solutions to boost competitive advantage with Communication Service Providers (CSPs).
Press release
-
Next-gen deep packet inspection software
ipoque offers the best deep packet inspection software to add real-time network and application visibility to your telco network analytics, traffic management, or cybersecurity solutions. If you are looking for ways to manage and secure your network as well as managing data flows more intelligently, ipoque’s advanced DPI technology can help you solve your challenges. The key to maintaining integrity, ensuring security and optimizing the efficiency of networks is a high-performant and efficient deep packet inspection software that delivers full visibility into IP-based network traffic in real time. By licensing our leading-edge DPI tool you can focus on your core competencies and benefit from a faster time to market. With our overview of use cases you can identify easily what are the advantages of integrating DPI technology into your product or solution.
For software vendors, network equipment vendors and solution builders
Page
-
GTP correlation for mobile network security
Use Case
-
SASE: Conquering the ever expanding enterprise edge
Secure Access Service Edge (SASE) is a network architecture that allows enterprises to securely connect remote users and devices to the enterprise-wide area network(WAN). SASE essentially combines ‘network-as-a-service’ with ‘security-as-a-service’ to provide enterprises, especially those with a growing number of edge connections covering branches, mobile workers, remote workers and IoT devices, the means to monitor, manage and secure their enterprise networks and assets. If SASE will be the crucial architecture for securing and managing the ever-expanding enterprise perimeter, deep packet inspection is the logical complement, providing real-time intelligence at every point along the way.
Blog post
-
Video streaming: networks and the game of bandwidth
It is evident that video streaming is on a fast track to becoming the new definition of the ‘Internet’, easily outdoing other bandwidth-intensive applications such as cloud gaming, augmented reality (AR) and virtual reality (VR). The demand for video content seems to move in tandem with network speeds, given that better speeds translate into faster streaming and improved quality of experience (QoE). One of the immediate effects of a rapid increase in video traffic is the strain it puts on network resources, resulting in network congestion and poor network performance. While this impairs almost all applications to some degree, video takes the biggest hit given its dependency on real-time availability of bandwidth and speeds. What operators need now are the right tools that deliver the required intelligence, timely and accurately, to maintain the required QoE and to successfully deploy their video streaming strategies.
Blog post
-
Identifying bestseller strategies: analytics and content monetization for telecom operators
When it comes to content business for telecom operators, borrowed strategies rarely work because no two markets are the same and no two operators are endowed with similar resources. This blog article discusses telecom operator content strategies and how real-time analytics of traffic flows help them develop, improve and implement these strategies. It assesses in particular, how DPI-driven analytics help in the choice of content and content partnerships, content delivery and pricing models.
Blog post