Last week, the RSA Conference was back in San Francisco. It is still the cybersecurity industry’s largest event, with more than 400+ exhibitors and 26,000 visitors. Fewer than the 42,000 visitors pre-pandemic, but still more than any other cybersecurity show. You could feel relief and excitement about meeting in person again, and comfort in seeing familiar themes, such as AI, automation, and difficulties in recruiting.
It was clear that Cloud security remains a strong megatrend accompanied by an alphabet soup of ZTNA, SASE, SSE, CASB, SWG. But “Zero Trust” wins the award for the strongest buzz at this year’s event.
With cloud security so hot, everyone was looking to know how to make it effective.
Well, we have the answer to that! Traffic visibility.
And how do you get the right traffic visibility? I hear you ask.
Easy! That’s Next Gen DPI!
Deep Packet Inspection is widely deployed to get traffic visibility in networking and security solutions. It analyzes network traffic flows to identify the protocols, applications and services in use, and extracts additional information in the form of metadata to support specific networking and security functions. However, as networks evolve and cyber attacks become more sophisticated, the visibility provided by traditional DPI can be limited.
Next Generation DPI (NG DPI) integrates new techniques to handle encrypted traffic, identify advanced cyberattacks, and meet the performance and scalability needs of cloud-based solutions.
On the Enea booth at RSA, Qosmos product experts were very much in demand. They were kept busy showing solution vendors how to best use NG DPI to ensure the differentiation and high performance required to keep their products one step ahead in the new cloud networking era. The most popular topics were ZTNA, CASB and SWG.
Here are some examples of actions that NG DPI enables:
The discussions at RSA once again confirmed that strong cloud security is based on strong traffic visibility. This is where NG DPI delivers: encrypted traffic classification, detection of anomalous and evasive traffic, wide application coverage, and cloud-grade scalability and performance!
Like to see it in action? Request a demo
Want to try it out? Request a free evaluation