Sycope Blog

Learn more from the blogposts with easy filters - explore posts by favorite topic or product below.

Learn more
This week top blog posts
Check all articles
Filter:
Clear all filters
Blog
NetFlow as valuable data source for SecOps
How to use inter-system correlations, optimizing work of SIEM systems and processing billions of flows in dedicated system.
Jan Rześny
16/04/2025
Read more >
Blog
How to use multi-layered approach in the cybersecurity strategy
An overview of key cybersecurity product categories.
Jan Rześny
22/05/2025
Read more >
Blog
How to effectively implement the threat modeling process?
What is threat modelling and how to design the process that can be applied to a wide range of infrastructures and business models.
Jan Rześny
16/04/2025
Read more >
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Jan Rześny
20/05/2025
Read more >
Blog
Controlling hybrid networks through automatic inventory of resources, applications, and their connections
Network and application resource inventory is an integral part of infrastructure management.
Jan Rześny
22/05/2025
Read more >
Blog
How historical data insights give us great analytical capabilities
Tools that analyse historical data insights come to the rescue when we need to know how many internet connections they are now or tomorrow.
Jan Rześny
16/04/2025
Read more >
Blog
Compliance – why NetFlow data makes is easy to store the data for a very long time?
Retain data according to law and security policies requirements.
Jan Rześny
21/05/2025
Read more >
Blog
Root cause analysis for increased traffic from another country
Master network insights with Sycope's Trend Dashboards - track traffic, drill into anomalies, and optimize performance effortlessly!
Jan Rześny
22/05/2025
Read more >
Blog
Multitenancy in Sycope
Single Master Console instance dedicated for Service Providers to remotely manage local clients’ instances (tenants).
Jan Rześny
21/05/2025
Read more >
Blog
How to detect crypto mining in your organization?
How could we try to detect the Resource Hijacking technique, a MITRE ATT&CK technique related to crypto mining activity?
Jan Rześny
16/04/2025
Read more >
Blog
Threat Hunting – how to hunt for a security threats?
When detection mechanisms rely on patterns and signatures, and adversaries often switch tactics, threat hunting process comes to the rescue.
Jan Rześny
16/04/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Jan Rześny
20/05/2025
Read more >