Customer Portal
Contact
Request a demo
Products
Visibility
Gain full visibility into all network activity to monitor traffic, performance, and IT security.
Performance
Evaluate and report key performance metrics to measure the effectiveness of your IT infrastructure.
Security
Identify and analyze security threats across the organization using MITRE ATT&CK-based tactics and techniques.
Asset discovery
Monitor network resources and record traffic between subnets, hosts, or applications using the NetFlow protocol for both technical and business insights.
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos
Tutorials, how-to videos and webinars.
Case Studies
Topics and terms around network visibility, performance and security well and easy explained.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Dictionary
All Sycope’s content in one place. Filter and search our library.
Support
Documentation
Comprehensive documentation with clear user guidelines.
Community support
A supportive Discord community offering help, guidance, and discussions.
FAQ
You ask – we answer. Frequently asked questions with clear and helpful answers.
Partners
Become a Partner
Grow your business with Sycope.
Deal Registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Career
Opportunities to join Sycope’s team.
Become a Partner
Request a demo
Become a Partner
Request a demo
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
Direct Network Flood
A type of DoS attack that overwhelms a network with excessive traffic, causing disruption and downtime.
Learn more >
Zero Trust Architecture
A security model that requires strict identity verification and continuous monitoring, assuming no user or device is trusted by default.
Learn more >
Web Shell Attacks
Deploying malicious scripts, pose security risks, enabling unauthorized access, data theft, and service disruptions.
Learn more >
Visibility
Awareness of everything that is on and transfer within the IT network, allowing you supervision of network traffic, performance and security
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
Active directory
Microsoft's proprietary directory service. It runs on Windows Server and enables administrators to manage permissions.
Learn more >
Cyber Threat Intelligence
Security feed algorithm implemented in Sycope CTI actively monitors a number of sources and generates unified list of current IoCs.
Learn more >
Data deduplication
It helps to save enormous amount of data storage. Sycope as first on the market used deduplication mechanism for NetFlow.
Learn more >
Data mining
A technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business.
Learn more >
Dead Drop Resolver
A technique where attackers hide malicious data in legitimate online resources, allowing covert control without direct contact.
Learn more >
Deep Packet Inspection
A method used in computer networking to scrutinise the content of data packets transmitted over a network.
Learn more >
Digital Experience Monitoring
A strategy for optimizing digital interactions, enhancing performance, ensuring security, and boosting user satisfaction.
Learn more >
Direct Network Flood
A type of DoS attack that overwhelms a network with excessive traffic, causing disruption and downtime.
Learn more >
End User Experience Monitoring
A strategy for optimizing end-users' interactions, focusing on real-time analysis.
Learn more >
Fast Flux
A technique where attackers rapidly change IP addresses of malicious servers, using a botnet to evade detection and takedown efforts.
Learn more >
Internet Peering
A direct network interconnection between ISPs, enabling mutual traffic exchange, enhancing efficiency, and reducing costs.
Learn more >
Intrusion Detecting System
A security solution that monitors network traffic for signs of suspicious activity, cyberattacks, or policy violations.
Learn more >
1
2
3
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
This site is registered on
wpml.org
as a development site. Switch to a production site key to
remove this banner
.