Qosmos

Resources

Qosmos Blog

Using DPI Inside a Security Product: How Do They Do That?

Monday, September 11, 2017

Interview with Erik Larsson, Senior Vice President Marketing & Communication, Enea Deep Packet Inspection (DPI) is a key technology in cybersecurity, used in next-generation firewalls and analytics platforms to provide detailed traffic understanding up to the application level. For most security vendors, sourcing a commercial DPI engine from a specialist has become the preferred method […]

Voices from the Field: Using Traffic Intelligence to Improve Switch Performance

Thursday, August 31, 2017

In this interview, we are talking to Amit, a developer and software architect for a range of LAN access switches. These high-performance switches offer enhanced quality of service (QoS), user authentication, deep packet inspection (DPI) and security features for the network edge. The latest release of the switch gives IT visibility and control of over […]

A New Approach to NFV Monitoring

Tuesday, June 27, 2017

Interview with Nicolas Bouthors, CTO of Enea, Qosmos Division   NFV is changing the way communication services are being delivered. What is the impact on monitoring? Virtualization has effectively decoupled services from the infrastructure delivering those services, thus making it difficult to trace any service fault to a particular piece of infrastructure. Our approach at […]

Voices from the Field: Upgrading to ixEngine v5 in Cybersecurity

Monday, June 26, 2017

In 2006, Qosmos launched the world’s first commercial DPI software development kit (or DPI engine), with the goal to help networking and cybersecurity solution developers accelerate time to market and strengthen their products. Since then, Enea’s Qosmos ixEngine has become the de facto industry standard. Deep Packet Inspection (DPI) is a key technology running inside […]

Visibility for NFV Monitoring: Are We There Yet?

Monday, June 12, 2017

In a recent poll*, more than 41% of respondents rated their current level of visibility into NFV as being Poor or Very poor. On the other hand, 43% of respondents thought it was Good, while another 16% thought it was Very good or Excellent. These results reflect NFV’s incomplete evolution with respect to critical operational […]

Which Cybersecurity Products Use Deep Packet Inspection and Why?

Tuesday, April 18, 2017

By Erik Larsson, VP Marketing at Qosmos, the network intelligence division of Enea. In a recent webinar with IHS Markit, the audience was asked the question “Which security products need DPI”? Here is my take on the results. Source: IHS Markit Webinar Poll March 2017   It is not surprising to see that most respondents […]

DPI – The Secret Ingredient of Robust Security Solutions?

Tuesday, March 28, 2017

Article first published on March 16th 2017 in Information Security Buzz. An interview with Nicolas Bouthors, Chief Technical Officer at Enea Qosmos, about the key role of Deep Packet Inspection (DPI) to strengthen cybersecurity solutions with application-level traffic visibility and detailed metadata. Erik Larsson, VP Marketing, Qosmos division of Enea (EL): There is a lot of […]

2017: Building the Foundation of the Future Internet

Tuesday, December 20, 2016

The future Internet will use virtual infrastructure, have built-in monitoring functions, and will be largely encrypted. In this article, I will describe developments in each of these areas in 2017. Trend #1: Virtual infrastructure will have built-in monitoring The growing importance of SDN/NFV-based architectures in carrier networks changes the requirements for monitoring solutions. For fully […]

CTO View: Boosting VNFs with Vector Packet Processing (VPP) and DPI

Monday, October 31, 2016

An interview with Nicolas Bouthors, Chief Technical Officer at Qosmos Nicolas explains how Vector Packet Processing (VPP) can be combined with Deep Packet Inspection (DPI) to build applications faster and more efficiently, improve VNF performance, and run several applications simultaneously. He illustrates this new approach with VNFs such as firewalling, traffic shaping and NAT running […]

Data Center Security: Micro-segmentation + Application Visibility = Strong Middle

Monday, September 19, 2016

Is perimeter defense sufficient for good data center security? As we know, data center perimeters are typically protected by firewalls and IDS/IPS. While these products are good at handling north-south traffic, in and out of the data center, they are not built for securing east-west traffic within the data center. This is becoming an issue […]