LATEST NEWS

Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

Rohde & Schwarz Cybersecurity, a leading IT security company, today announced the availability of its new Bitcoin protocol classification capabilities provided by the deep packet inspection (DPI) engine R&S PACE 2. The OEM software solution is now able to reliably detect and classify the Bitcoin protocol in network traffic in real time.

Bitcoin is a cryptocurrency and a digital payment system. Transactions are made peer-to-peer and are written directly on a distributed ledger named “blockchain”. The digital money is issued and managed without any central authority – meaning no governments or banks are involved. The virtual money can be exchanged for other currencies, products and services and shopping web sites accept cryptocurrencies as a method of payment.

With the new Bitcoin protocol classification capabilities provided by R&S PACE 2, vendors embedding the DPI engine in their network security and analytics solutions are now able to classify Bitcoin transactions within IP-based network traffic in order to fully understand how a network is utilized.

They can accurately and reliably identify Bitcoin network activities and implement security policies accordingly. This increases their visibility of and their control over potential security risks related to Bitcoin transactions.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioral traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good or malicious.

Liat

Recent Posts

RIKEN adopts Siemens’ emulation and High-Level Synthesis platforms for next-generation AI device research

Siemens’ emulation and HLS platforms support leading Japanese research institute’s evaluation of optimized AI computing…

12 hours ago

Nilus Raises $10M, Reaching $18M in Funding to Lead the Future of AI-Powered Treasury Management

Nilus, the first proactive AI-powered treasury management platform, has raised an additional $10M in a…

12 hours ago

Reeco Raises $15M Series A Round to Modernize Hotel Procurement with AI-Driven Procure-to-Pay Platform

Funding will drive Reeco’s strategic growth initiatives as it streamlines back-of-house operations for North American…

3 days ago

Introducing RUBY-W2: u-blox’s first Wi-Fi 7 module for superior Apple® CarPlay and Android® Auto user experience

Connect more concurrent users with the advanced Wi-Fi 7 capabilities of the Snapdragon® Auto Connectivity…

3 days ago

Anritsu Extend Spectrum Measurement Frequency to Millimeter-wave Band with External Mixer from VDI or Eravant

- Supporting Millimeter-wave Band of Medical and Automotive Device Evaluations - Anritsu Corporation is pleased…

3 days ago

ROHM Offers the Industry’s Smallest* Terahertz Wave Oscillation and Detection Devices

Price range is less than one-tenth that of conventional devices while achieving remarkable space-savings ROHM…

3 days ago