Tag:

Check all articles
Video
Utilizing ready-to-use system elements for smooth operations
 Utilizing ready-to-use system elements for smooth operations to facilitate the usage of the system.
Watch >
Video
How to identify a brute force attack?
A brute force attack is a type of cyberattack in which an attacker tries to gain access to a system or account, how to identify that with Sycope?
Watch >
Video
How do you drill down data?
Easy top-down access: drill down mechanisms enable viewing of data for a specific port, interface or IP address
Watch >
Video
How to view original flows related to a given alert?
Gain better understanding what happened in your network, check the nature of the attack, and take steps to prevent it from happening again.
Watch >
Blog
Data Deduplication and NetFlow: How to Save Storage Space and Improve Data Analysis
Discover how to save storage space and improve data analysis using this simple methods.
Jan Rześny
16/04/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Jan Rześny
16/04/2025
Read more >
Blog
Data role-based access control (RBAC) do you need that?
Data role-based access control (data RBAC) is an important feature helping you to mitigate the risk of data breaches.
Jan Rześny
16/04/2025
Read more >
Blog
How to detect network IoCs (URLs, Domains and IPs) in context of SNOWYAMBER, HALFRIG and QUARTERRIG in Sycope NSM?
SKW and CSIRT NASK observed a wide-ranging espionage campaign related to Russian secret services.
Jan Rześny
16/04/2025
Read more >
Blog
The cyberattacks – reminder of the importance of network monitoring and security
Remain alert. The cyberattacks are a stark reminder of the importance of cybersecurity and network monitoring in today's world.
Jan Rześny
16/04/2025
Read more >
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Jan Rześny
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.