Tag: Blog

Check all articles
Blog
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
Gaining insight into Layer 7 application is one of the crucial advantages for network monitoring in areas of performance and security.
Jan Rześny
21/05/2025
Read more >
Blog
Multitenancy in Sycope
Single Master Console instance dedicated for Service Providers to remotely manage local clients’ instances (tenants).
Paweł Drzewiecki
21/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Marcin Kaźmierczak
21/05/2025
Read more >
Blog
Integrating Sycope Audit Logs with SIEM for Enhanced Compliance and Monitoring
One of the security best practices is to store and analyze that information in a centralized location, like a SIEM
Marcin Kaźmierczak
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Paweł Drzewiecki
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Paweł Drzewiecki
20/05/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Marcin Kaźmierczak
20/05/2025
Read more >
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Marcin Kaźmierczak
20/05/2025
Read more >
Blog
Data Deduplication and NetFlow: How to Save Storage Space and Improve Data Analysis
Discover how to save storage space and improve data analysis using this simple methods.
Paweł Drzewiecki
16/04/2025
Read more >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Paweł Drzewiecki
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.