LATEST NEWS

Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

Rohde & Schwarz Cybersecurity, a leading IT security company, today announced the availability of its new Bitcoin protocol classification capabilities provided by the deep packet inspection (DPI) engine R&S PACE 2. The OEM software solution is now able to reliably detect and classify the Bitcoin protocol in network traffic in real time.

Bitcoin is a cryptocurrency and a digital payment system. Transactions are made peer-to-peer and are written directly on a distributed ledger named “blockchain”. The digital money is issued and managed without any central authority – meaning no governments or banks are involved. The virtual money can be exchanged for other currencies, products and services and shopping web sites accept cryptocurrencies as a method of payment.

With the new Bitcoin protocol classification capabilities provided by R&S PACE 2, vendors embedding the DPI engine in their network security and analytics solutions are now able to classify Bitcoin transactions within IP-based network traffic in order to fully understand how a network is utilized.

They can accurately and reliably identify Bitcoin network activities and implement security policies accordingly. This increases their visibility of and their control over potential security risks related to Bitcoin transactions.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioral traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good or malicious.

Liat

Recent Posts

Molex Completes Acquisition of Teramount Ltd.

Molex, a global electronics leader and connectivity innovator, has completed the acquisition of Teramount Ltd.,…

3 days ago

Immunai Expands Oncology Collaboration, Extending AI-Driven Biomarker and Clinical Insights Through 2027

This agreement marks the third expansion of its collaboration with AstraZeneca, building on collaborations in…

3 days ago

Cleveland Clinic, RIKEN, and IBM Model a 12,635-Atom Protein – the Largest Known to Be Simulated with Quantum Computers

Milestone simulation of biologically meaningful molecules expands quantum-centric supercomputing’s role as a scientific tool Scientists…

6 days ago

Never lose the signal: the Israeli company redefining military communications

Commcrete develops compact satellite communication devices that maintain secure connectivity during combat, rescue, and electronic…

6 days ago

Yaron Elad and Elik Etzion Launch AlphaDrive, a $100 Million Fund Focusing on Cyber and AI Investments

Leumi Partners has joined the fund as an anchor investor. The fund has already invested…

1 week ago

60W DOE Level VII ready IP42-sealed wall-mount adapters for medical, home healthcare, and industrial applications

XP Power introduces the AMF60 series of 60W wall-mount AC-DC power supplies for medical, home…

2 weeks ago