Skip to content
Contact technical expert

Cubro Blog

See the latest Cubro news, product updates, network visibility use cases and network technology trends and best practices. Keep track of Cubro’s latest technology and stay in the loop.

Why network visibility is critical for security

Why network visibility is critical for security

You can only secure what you can see – network visibility is essential for security. Omnia, the latest network visibility device from Cubro, can be configured as a network security appliance with an integrated network TAP and Packet Broker by installing the appropriate software application.

Why network visibility is essential for successful Digital Transformation outcomes?

NPB technology can help businesses and organizations to significantly reduce the risk of not achieving or delaying a successful digital transformation outcome to help them increase their revenue, profitability and share value.

Value of network visibility solutions

The value of network visibility solutions for today’s Service Provider and Enterprises

Network visibility technology has been deployed by Service Providers and Enterprises for the last 15 years or so and remains as important to a successful business and IT outcomes today as it was then. The use cases for visibility technology have developed as networks have changed and are now able to provide new, incremental value to organizations. The blog examines the value of visibility solutions and the reasons why they are essential for the success of contemporary IT initiatives and business outcomes.

Cubro EXA8 for Open Source Projects

EXA8 for Open Source Projects

Cubro hosted the Elevate the EXA8 contest shortly after release to offer the open-source community a chance to develop unique applications on the EXA8 hardware. The final submissions to the contest highlight the diverse capabilities of the EXA8 and the ingenuity of the open-source community.

Cubro DPI Approach for Telecommunication

Deep Packet Inspection in Telecommunication

Deep Packet Inspection (DPI) is a technology that enables the network owner to analyse internet traffic, through the network, in real-time and to differentiate them according to their payload. DPI is often used for understanding the performance or behaviour of subscribers, which applications they use, how often etc. This helps operators to focus on improving service for important applications.

Security hygiene for remote workers part 3

Security Hygiene for Remote Workers: Part 4

In the previous installment we secured our Wi-Fi and discussed segmenting our network to the best of our ability. All this work will be for naught, however, if we allow malicious software in through our own actions. In this final installment we will examine user behaviour and review known avenues of exploits relative to the coronavirus outbreak.

The Wireless Network and Segmentation

Security Hygiene for Remote Workers: Part 3

In this section, we will turn our attention to the wireless portion of the home network because restricting access to our network from the outside world does little good if a bad actor can gain access to our LAN. When setting up our Wi-Fi we absolutely want to be using WPA2 with PSK at a minimum (That’s Wireless Protected Access 2 with Pre-Shared Key).

Sensitive Data and Work Compputer

Security Hygiene for Remote Workers: Part 2

In the previous article, we discussed what we can do to protect sensitive data while working remotely as well as good practices to secure our computer systems against malware and exploits. In this section, we will take a look at what could be the most neglected piece of equipment in your home network: your router.

blog-pic_Security-Hygiene-Remote-Workers_system_blog

Security Hygiene for Remote Workers – Part 1

With the spread of the SARS-COV-2 virus, responsible for COVID-19, an unprecedented number of people have found themselves working remotely. This brings a lot of new challenges to bear, not the least of which is simply putting together a workspace in the home. Unfortunately, a remote worker’s considerations shouldn’t end at simply gathering the tools to work remotely. It is very important during this time to be conscious of security practices regarding your computing habits and home network.

Empower yourself with the right tools; take control of your network

Control What You Can and Acknowledge What Is Beyond Control

It seems we are constantly dealing with natural disasters, epidemics, pandemics, and economic crisis. While these are situations that are, quite simply, beyond anyone’s control one can and should be prepared for a variety of circumstances to the best of their ability. The good news is we almost always have far more control to correct the issues related to the network. With regards to day to day operation, the right tools can assist you in accelerating troubleshooting, improving security, and optimizing efficiency.

IOT-Based Geolocation Tracking without GPS

Using Cubro probes and geolocation technology, every user can be tracked by location, in near real-time. This is done by triangulating the signal of a tracking device.

Next generation NPB for Cubro

What “Next Generation Network Packet Broker” Means to Cubro

With virtualized environments we have many more endpoints, often interconnected via complex tunnelling protocols, in a dynamic and rapidly changing topology. Cubro addresses this need in our Next Gen NPBs with support for numerous tunnelling protocols including MPLS, MPLS over UDP, GRE, NVGRE, VXLAN, and GTP. Support for these is not limited to merely stripping tunnel headers, rather, our Next Gen NPBs can also serve as tunnel endpoints and filter inside the tunnels while leaving the tunnel headers intact.

EXA32100 VXLAN Termination – To Save Your Sanity!

Using Cubro EXA32100, the customer can reduce business costs by making the team more productive. The service provider can save money because it needs to spend less on the cost of network operators.

Network Packet Brokers and Encapsulated Traffic – Part 1

Encapsulation, tagging, or labeling network traffic is a necessity in all but the simplest of modern networks. Whether it is simply VLAN tagging to isolate broadcast domains, building complex overlay networks, or segmenting virtual traffic.

The downside of virtual probing approach in mobile networks

For probes to get the relevant traffic, it needs smart network visibility solution which we offer at Cubro. In legacy networks, we use network TAPs, aggregators, NPB “network packet brokers” to feed the relevant data to the probe …

How to improve enterprise network visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market …

The Year in Pictures

Another year coming to an end! With a presence in every region of the world, we have a truly global footprint that gives us a significant competitive advantage. We have been recognized by some of the highly acclaimed magazines and research organisations …

Introductory Guide to Network Packet Brokers

An introductory guide into What is a network packet broker and what does it offer …

Network Visibility Solutions for 40Gbit and 100Gbit

Network Visibility Solutions for 40Gbit and 100Gbit – Cubro offers optical TAPs, copper TAPs and aggregator TAPs which are designed to enable flawless in-line monitoring of 1G, 10G, 40G and 100G networks …

Network Visibility for Healthcare Organisations

Network Visibility for Healthcare Organisations

Network Visibility for Healthcare Organisations – Medical institutions need real-time network visibility to protect their sensitive patient data and maximise network performance …