Sycope Blog

Learn more from the blogposts with easy filters - explore posts by favorite topic or product below.

Learn more
This week top blog posts
Check all articles
Filter:
Clear all filters
Blog
3 IT trends that will stay with us for a long time.
What will the future bring us? We asked this question in the context of network monitoring and the general IT world.
Jan Rześny
16/04/2025
Read more >
Blog
Data Deduplication and NetFlow: How to Save Storage Space and Improve Data Analysis
Discover how to save storage space and improve data analysis using this simple methods.
Jan Rześny
16/04/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Jan Rześny
20/05/2025
Read more >
Blog
2022 was a year for Sycope
Small sum up for 2022. As we had into 2023, we're proud to reflect on everything that happened over the past year.
Jan Rześny
16/04/2025
Read more >
Blog
Why do I need NetFlow?
Monitoring and managing network traffic can be a complex task. This is where NetFlow comes into play.
Jan Rześny
20/05/2025
Read more >
Blog
Network flow monitoring – a valuable source of data for SIEM systems
SIEM is the central security system for most organisations, network flow monitoring can help to increase companies’ defensive capabilities.
Jan Rześny
16/04/2025
Read more >
Blog
How to use multi-layered approach in the cybersecurity strategy
An overview of key cybersecurity product categories.
Jan Rześny
22/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Jan Rześny
21/05/2025
Read more >
Blog
Compliance – why NetFlow data makes is easy to store the data for a very long time?
Retain data according to law and security policies requirements.
Jan Rześny
21/05/2025
Read more >
Blog
Threat Hunting – how to hunt for a security threats?
When detection mechanisms rely on patterns and signatures, and adversaries often switch tactics, threat hunting process comes to the rescue.
Jan Rześny
16/04/2025
Read more >
Blog
New release Sycope 3.0
Sycope announces the latest release of its network traffic and security monitoring software is first and foremost a huge number of new built-in views for data analysis.
21/05/2025
Read more >
Blog
Controlling hybrid networks through automatic inventory of resources, applications, and their connections
Network and application resource inventory is an integral part of infrastructure management.
Jan Rześny
22/05/2025
Read more >