Tag: Network security

Check all articles
Blog
Detecting resources and their connections based on NetFlow clients, servers, applications, and other network elements
Let's discuss what we can obtain by creating an inventory using NetFlow packets.
Jan Rześny
22/05/2025
Read more >
Blog
How to use multi-layered approach in the cybersecurity strategy
An overview of key cybersecurity product categories.
Jan Rześny
22/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Jan Rześny
21/05/2025
Read more >
Blog
Integrating Sycope Audit Logs with SIEM for Enhanced Compliance and Monitoring
One of the security best practices is to store and analyze that information in a centralized location, like a SIEM
Jan Rześny
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Jan Rześny
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Jan Rześny
20/05/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Jan Rześny
20/05/2025
Read more >
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Jan Rześny
20/05/2025
Read more >
Video
Utilizing ready-to-use system elements for smooth operations
 Utilizing ready-to-use system elements for smooth operations to facilitate the usage of the system.
Watch >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Jan Rześny
16/04/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.