Search results

  1. Cryptocurrency and DPI: Unearthing threats in the blockchain world

    Crypto transactions can significantly strain modern networks given their growth, intensity and susceptibility to mass-scale attacks. Also, using encryption to anonymize cryptocurrency transactions creates huge gaps in traffic observability. Find out how the capabilities of DPI in identifying crypto protocols and applications help network operators and security vendors secure networks and devices while protecting the platforms transacting and storing cryptocurrencies.

    Blog post

  2. QUIC: How DPI with encrypted traffic intelligence supports the web’s latest protocol

    QUIC is a network layer protocol that uses the UDP protocol and TLS-based encryption to deliver web traffic between devices. This article discusses the visibility challenges introduced by QUIC and the impact of this on traffic management and security. It also assesses how deep packet inspection (DPI) with encrypted traffic intelligence (ETI) addresses these challenges and powers networking and cybersecurity tools against the rapid growth of QUIC traffic.

    Blog post

  3. Comparing DPI and flow-based analysis for network traffic insights

    This article compares deep packet inspection (DPI) and flow-based analysis. Benefits of DPI such as granular, real-time application and threat awareness are compared with metadata-driven insights produced in flow-based analysis. Other evaluation criteria such as form factors, deployment complexities and standardization requirements are also discussed to ascertain how each analysis type fits different use cases and networking environments.

    Blog post

All results loaded