Customer Portal
Contact
English
Polski
Use free version
Products
Visibility
Gain full visibility into all network activity to monitor traffic, performance, and IT security.
Performance
Evaluate and report key performance metrics to measure the effectiveness of your IT infrastructure.
Security
Identify and analyze security threats across the organization using MITRE ATT&CK-based tactics and techniques.
Asset discovery
Monitor network resources and record traffic between subnets, hosts, or applications using the NetFlow protocol for both technical and business insights.
Solutions
Use cases
See how Sycope supports IT teams in daily operations with network automation, integrations, and smart workflows.
Industries
Sycope unifies the needs of multiple sectors in one solution, delivering visibility, security, and compliance for networks of any scale.
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos library
Tutorials, how-to videos and webinars.
Case Studies
Topics and terms around network visibility, performance and security well and easy explained.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Dictionary
All Sycope’s content in one place. Filter and search our library.
Support
Documentation
Comprehensive documentation with clear user guidelines.
GitHub support
Helping developers grow through guidance, support, and open-source collaboration.
FAQ
You ask – we answer. Frequently asked questions with clear and helpful answers.
Partners
Become a Partner
Grow your business with Sycope.
Deal registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Career
Opportunities to join Sycope’s team.
Request a demo
Use free version
Request a demo
Use free version
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
UDP Protocol
A fast and connectionless communication method used for transmitting data without guarantees of delivery or order.
Learn more >
TCP Protocol
A reliable, ordered, and error-checked data transmission method, essential for web browsing, email, and file transfers.
Learn more >
TAPs
A hardware device used to capture and monitor network traffic, allowing troubleshooting, analysing performance, and enhancing security.
Learn more >
SPAN
A method of monitoring network traffic that copies network packets from selected ports to a monitoring port.
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
IPFIX
A standardized method for exporting network flow data, enabling detailed analysis of traffic patterns.
Learn more >
MITTRE ATT&CK
A knowledge base that classifies and documents cyber threat tactics and techniques enabling effective defence against cyber attacks.
Learn more >
NAC
A cybersecurity system designed to regulate and manage access to computer networks.
Learn more >
NetFlow
Information about streams of data flowing through network devices is called NetFlow - the most widely-used standard for flow data statistics
Learn more >
Network Observability
A real-time data analysis, enabling proactive issue resolution and optimization for seamless operations and enhanced security.
Learn more >
Network Topology
A blueprint of device connections, defining data flow patterns and influencing performance and fault tolerance.
Learn more >
Phishing
Phishing attacks can be difficult to detect. However, there are steps you can take to protect yourself from phishing attacks.
Learn more >
Port Scanning
A method of detecting vulnerable nodes in a network by accessing different ports on a host or same port on different hosts.
Learn more >
Principle of Least Privilege
A cybersecurity principle limiting user access to essential functions, minimizing risks, and safeguarding sensitive data.
Learn more >
Process Doppelgänging
A sophisticated malware injection technique that creates and executes malicious processes without being detected.
Learn more >
RBAC
A security method that assigns permissions to roles rather than individuals, ensuring users only access necessary resources.
Learn more >
SIEM
A cybersecurity system that provides real-time monitoring, analysis, and correlation of security events within a network infrastructure.
Learn more >
1
2
3
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
This site is registered on
wpml.org
as a development site. Switch to a production site key to
remove this banner
.