Customer Portal
Contact
Request a demo
Products
Visibility
Gain full visibility into all network activity to monitor traffic, performance, and IT security.
Performance
Evaluate and report key performance metrics to measure the effectiveness of your IT infrastructure.
Security
Identify and analyze security threats across the organization using MITRE ATT&CK-based tactics and techniques.
Asset discovery
Monitor network resources and record traffic between subnets, hosts, or applications using the NetFlow protocol for both technical and business insights.
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos
Tutorials, how-to videos and webinars.
Case Studies
Topics and terms around network visibility, performance and security well and easy explained.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Dictionary
All Sycope’s content in one place. Filter and search our library.
Support
Documentation
Comprehensive documentation with clear user guidelines.
Community support
A supportive Discord community offering help, guidance, and discussions.
FAQ
You ask – we answer. Frequently asked questions with clear and helpful answers.
Partners
Become a Partner
Grow your business with Sycope.
Deal Registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Career
Opportunities to join Sycope’s team.
Become a Partner
Request a demo
Become a Partner
Request a demo
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
SIEM
A cybersecurity system that provides real-time monitoring, analysis, and correlation of security events within a network infrastructure.
Learn more >
RBAC
A security method that assigns permissions to roles rather than individuals, ensuring users only access necessary resources.
Learn more >
Process Doppelgänging
A sophisticated malware injection technique that creates and executes malicious processes without being detected.
Learn more >
Principle of Least Privilege
A cybersecurity principle limiting user access to essential functions, minimizing risks, and safeguarding sensitive data.
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
SPAN
A method of monitoring network traffic that copies network packets from selected ports to a monitoring port.
Learn more >
TAPs
A hardware device used to capture and monitor network traffic, allowing troubleshooting, analysing performance, and enhancing security.
Learn more >
TCP Protocol
A reliable, ordered, and error-checked data transmission method, essential for web browsing, email, and file transfers.
Learn more >
UDP Protocol
A fast and connectionless communication method used for transmitting data without guarantees of delivery or order.
Learn more >
Visibility
Awareness of everything that is on and transfer within the IT network, allowing you supervision of network traffic, performance and security
Learn more >
Web Shell Attacks
Deploying malicious scripts, pose security risks, enabling unauthorized access, data theft, and service disruptions.
Learn more >
Zero Trust Architecture
A security model that requires strict identity verification and continuous monitoring, assuming no user or device is trusted by default.
Learn more >
1
2
3
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration