See the latest Cubro news, product updates, network visibility use cases and network technology trends and best practices. Keep track of Cubro’s latest technology and stay in the loop.
You can only secure what you can see – network visibility is essential for security. Omnia, the latest network visibility device from Cubro, can be configured as a network security appliance with an integrated network TAP and Packet Broker by installing the appropriate software application.
NPB technology can help businesses and organizations to significantly reduce the risk of not achieving or delaying a successful digital transformation outcome to help them increase their revenue, profitability and share value.
Network visibility technology has been deployed by Service Providers and Enterprises for the last 15 years or so and remains as important to a successful business and IT outcomes today as it was then. The use cases for visibility technology have developed as networks have changed and are now able to provide new, incremental value to organizations. The blog examines the value of visibility solutions and the reasons why they are essential for the success of contemporary IT initiatives and business outcomes.
Cubro hosted the Elevate the EXA8 contest shortly after release to offer the open-source community a chance to develop unique applications on the EXA8 hardware. The final submissions to the contest highlight the diverse capabilities of the EXA8 and the ingenuity of the open-source community.
Deep Packet Inspection (DPI) is a technology that enables the network owner to analyse internet traffic, through the network, in real-time and to differentiate them according to their payload. DPI is often used for understanding the performance or behaviour of subscribers, which applications they use, how often etc. This helps operators to focus on improving service for important applications.
In the previous installment we secured our Wi-Fi and discussed segmenting our network to the best of our ability. All this work will be for naught, however, if we allow malicious software in through our own actions. In this final installment we will examine user behaviour and review known avenues of exploits relative to the coronavirus outbreak.
In this section, we will turn our attention to the wireless portion of the home network because restricting access to our network from the outside world does little good if a bad actor can gain access to our LAN. When setting up our Wi-Fi we absolutely want to be using WPA2 with PSK at a minimum (That’s Wireless Protected Access 2 with Pre-Shared Key).
In the previous article, we discussed what we can do to protect sensitive data while working remotely as well as good practices to secure our computer systems against malware and exploits. In this section, we will take a look at what could be the most neglected piece of equipment in your home network: your router.
With the spread of the SARS-COV-2 virus, responsible for COVID-19, an unprecedented number of people have found themselves working remotely. This brings a lot of new challenges to bear, not the least of which is simply putting together a workspace in the home. Unfortunately, a remote worker’s considerations shouldn’t end at simply gathering the tools to work remotely. It is very important during this time to be conscious of security practices regarding your computing habits and home network.
It seems we are constantly dealing with natural disasters, epidemics, pandemics, and economic crisis. While these are situations that are, quite simply, beyond anyone’s control one can and should be prepared for a variety of circumstances to the best of their ability. The good news is we almost always have far more control to correct the issues related to the network. With regards to day to day operation, the right tools can assist you in accelerating troubleshooting, improving security, and optimizing efficiency.
Using Cubro probes and geolocation technology, every user can be tracked by location, in near real-time. This is done by triangulating the signal of a tracking device.
With virtualized environments we have many more endpoints, often interconnected via complex tunnelling protocols, in a dynamic and rapidly changing topology. Cubro addresses this need in our Next Gen NPBs with support for numerous tunnelling protocols including MPLS, MPLS over UDP, GRE, NVGRE, VXLAN, and GTP. Support for these is not limited to merely stripping tunnel headers, rather, our Next Gen NPBs can also serve as tunnel endpoints and filter inside the tunnels while leaving the tunnel headers intact.
Using Cubro EXA32100, the customer can reduce business costs by making the team more productive. The service provider can save money because it needs to spend less on the cost of network operators.
Encapsulation, tagging, or labeling network traffic is a necessity in all but the simplest of modern networks. Whether it is simply VLAN tagging to isolate broadcast domains, building complex overlay networks, or segmenting virtual traffic.
For probes to get the relevant traffic, it needs smart network visibility solution which we offer at Cubro. In legacy networks, we use network TAPs, aggregators, NPB “network packet brokers” to feed the relevant data to the probe …
Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market …
Another year coming to an end! With a presence in every region of the world, we have a truly global footprint that gives us a significant competitive advantage. We have been recognized by some of the highly acclaimed magazines and research organisations …
An introductory guide into What is a network packet broker and what does it offer …
Network Visibility Solutions for 40Gbit and 100Gbit – Cubro offers optical TAPs, copper TAPs and aggregator TAPs which are designed to enable flawless in-line monitoring of 1G, 10G, 40G and 100G networks …
Network Visibility for Healthcare Organisations – Medical institutions need real-time network visibility to protect their sensitive patient data and maximise network performance …