Categories: LATEST NEWS

Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

Rohde & Schwarz Cybersecurity, a leading IT security company, today announced the availability of its new Bitcoin protocol classification capabilities provided by the deep packet inspection (DPI) engine R&S PACE 2. The OEM software solution is now able to reliably detect and classify the Bitcoin protocol in network traffic in real time.

Bitcoin is a cryptocurrency and a digital payment system. Transactions are made peer-to-peer and are written directly on a distributed ledger named “blockchain”. The digital money is issued and managed without any central authority – meaning no governments or banks are involved. The virtual money can be exchanged for other currencies, products and services and shopping web sites accept cryptocurrencies as a method of payment.

With the new Bitcoin protocol classification capabilities provided by R&S PACE 2, vendors embedding the DPI engine in their network security and analytics solutions are now able to classify Bitcoin transactions within IP-based network traffic in order to fully understand how a network is utilized.

They can accurately and reliably identify Bitcoin network activities and implement security policies accordingly. This increases their visibility of and their control over potential security risks related to Bitcoin transactions.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioral traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good or malicious.

Liat

Comments are closed.

Recent Posts

BeyondTrust Acquires Entitle, Strengthening Privileged Identity Security Platform with Paradigm Shifting Just-in-Time Access and Identity Governance

Entitle is a pioneering privilege management solution that discovers, manages, and automates just-in-time (JIT) access and modern identity governance and…

2 weeks ago

Samtec Introduces SIBORG Tool to Speed Component Launch Designs

Available freely to Samtec customers under NDA, SIBORG (Signal Integrity Breakout Region Guru) works with Ansys HFSS 3D Layout to…

2 weeks ago

Accelerating Mass Business AI Adoption: NeuReality Launches Developer Portal for NR1 Inference Platform, Expanding Affordable AI Access

Entire NR1 system purpose-built for a more affordable AI infrastructure allowing for faster deployment; furthering AI’s reach into more parts…

2 weeks ago

Dot Compliance Raises a $17.5 Million Up-Round in Series B Extension Funding to Advance New Category of AI-driven Compliance

Following rapid growth in its customer base to over 400, funding will fuel further AI development and create a hybrid…

2 weeks ago

Tektronix and recently acquired EA Elektro-Automatik now offer expanded power portfolio for engineers who are electrifying our world

The addition of EA’s high-efficiency regenerative power supplies greatly expands Tektronix’s trusted offering Tektronix, Inc, a leading provider in test…

3 weeks ago

Melexis unveils fully integrated inductive switch

Melexis reveals its groundbreaking Induxis® switch, the MLX92442. Contactless, magnet-free, and strayfield immune, this monolithic solution directly detects conductive targets.…

3 weeks ago