Tag: Security

Check all articles
News
New release Sycope 3.0
Sycope announces the latest release of its network traffic and security monitoring software is first and foremost a huge number of new built-in views for data analysis.
Magda Bącela
21/05/2025
Read more >
Blog
Multitenancy in Sycope
Single Master Console instance dedicated for Service Providers to remotely manage local clients’ instances (tenants).
Paweł Drzewiecki
21/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Marcin Kaźmierczak
21/05/2025
Read more >
Blog
Integrating Sycope Audit Logs with SIEM for Enhanced Compliance and Monitoring
One of the security best practices is to store and analyze that information in a centralized location, like a SIEM
Marcin Kaźmierczak
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Paweł Drzewiecki
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Paweł Drzewiecki
20/05/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Marcin Kaźmierczak
20/05/2025
Read more >
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Marcin Kaźmierczak
20/05/2025
Read more >
Video
Utilizing ready-to-use system elements for smooth operations
 Utilizing ready-to-use system elements for smooth operations to facilitate the usage of the system.
Watch >
Video
How to identify a brute force attack?
A brute force attack is a type of cyberattack in which an attacker tries to gain access to a system or account, how to identify that with Sycope?
Watch >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.