Tag: Network Scanning

Check all articles
Blog
Detecting resources and their connections based on NetFlow clients, servers, applications, and other network elements
Let's discuss what we can obtain by creating an inventory using NetFlow packets.
Jan Rześny
22/05/2025
Read more >
Blog
Controlling hybrid networks through automatic inventory of resources, applications, and their connections
Network and application resource inventory is an integral part of infrastructure management.
Jan Rześny
22/05/2025
Read more >
Blog
Root cause analysis for increased traffic from another country
Master network insights with Sycope's Trend Dashboards - track traffic, drill into anomalies, and optimize performance effortlessly!
Jan Rześny
22/05/2025
Read more >
Blog
How to detect network artifacts related to APT28 in Sycope?
Detecting network artefacts related to APT28 involves a combination of network monitoring, threat intelligence, and security best practices.
Jan Rześny
21/05/2025
Read more >
Blog
Compliance – why NetFlow data makes is easy to store the data for a very long time?
Retain data according to law and security policies requirements.
Jan Rześny
21/05/2025
Read more >
Blog
NPM and NDR: Complementary Tools for Network Security and Performance
Network security and performance are two primary concerns for any organization that relies heavily on its network infrastructure.
Jan Rześny
21/05/2025
Read more >
Blog
Analysis of security events in Sycope NSM
Sycope is a network monitoring system designed to detect network anomalies and security threats based on Netflow and pcaps
Jan Rześny
20/05/2025
Read more >
Blog
The rise of the Tech Guardians: how network monitoring tools secure your network
Understand the role of network monitoring tools in modern businesses and best practices of its implementation.
Jan Rześny
20/05/2025
Read more >
Video
How to identify a brute force attack?
A brute force attack is a type of cyberattack in which an attacker tries to gain access to a system or account, how to identify that?
Watch >
Blog
How to monitor encrypted traffic in Sycope?
Due to the prevalence of encrypted traffic in organizations, monitoring it as a technique can be particularly advantageous.
Jan Rześny
16/04/2025
Read more >