Tag: Network Scanning

Check all articles
Blog
Out-of-the Box Network Performance Monitoring
Sycope & Garland Technologies partnership-monitor and respond to events with confidence, knowing you’re seeing the complete network traffic.
03/06/2025
Read more >
Blog
What is NetFlow and how is this protocol used in practise
Information about streams of data flowing through network devices is called NetFlow. Switches and routers, as well as other components, collect and store information about the data transmitted within the network.
Jan Rześny
03/06/2025
Read more >
Blog
Detecting resources and their connections based on NetFlow clients, servers, applications, and other network elements
Let's discuss what we can obtain by creating an inventory using NetFlow packets.
Jan Rześny
22/05/2025
Read more >
Blog
Controlling hybrid networks through automatic inventory of resources, applications, and their connections
Network and application resource inventory is an integral part of infrastructure management.
Jan Rześny
22/05/2025
Read more >
Blog
Root cause analysis for increased traffic from another country
Master network insights with Sycope's Trend Dashboards - track traffic, drill into anomalies, and optimize performance effortlessly!
Jan Rześny
22/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Jan Rześny
21/05/2025
Read more >
Blog
Compliance – why NetFlow data makes is easy to store the data for a very long time?
Retain data according to law and security policies requirements.
Jan Rześny
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Jan Rześny
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Jan Rześny
20/05/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Jan Rześny
20/05/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.