Qosmos Blog

DPI – The Secret Ingredient of Robust Security Solutions?

Tuesday, March 28, 2017

Article first published on March 16th 2017 in Information Security Buzz. An interview with Nicolas Bouthors, Chief Technical Officer at Enea Qosmos, about the key role of Deep Packet Inspection (DPI) to strengthen cybersecurity solutions with application-level traffic visibility and detailed metadata. Erik Larsson, VP Marketing, Qosmos division of Enea (EL): There is a lot of […]

2017: Building the Foundation of the Future Internet

Tuesday, December 20, 2016

The future Internet will use virtual infrastructure, have built-in monitoring functions, and will be largely encrypted. In this article, I will describe developments in each of these areas in 2017. Trend #1: Virtual infrastructure will have built-in monitoring The growing importance of SDN/NFV-based architectures in carrier networks changes the requirements for monitoring solutions. For fully […]

CTO View: Boosting VNFs with Vector Packet Processing (VPP) and DPI

Monday, October 31, 2016

An interview with Nicolas Bouthors, Chief Technical Officer at Qosmos Nicolas explains how Vector Packet Processing (VPP) can be combined with Deep Packet Inspection (DPI) to build applications faster and more efficiently, improve VNF performance, and run several applications simultaneously. He illustrates this new approach with VNFs such as firewalling, traffic shaping and NAT running […]

Data Center Security: Micro-segmentation + Application Visibility = Strong Middle

Monday, September 19, 2016

Is perimeter defense sufficient for good data center security? As we know, data center perimeters are typically protected by firewalls and IDS/IPS. While these products are good at handling north-south traffic, in and out of the data center, they are not built for securing east-west traffic within the data center. This is becoming an issue […]

vCPE Services: Through Thick and Thin

Thursday, July 28, 2016

In my previous post I explored how deployments can mix thick and thin vCPEs to accommodate factors such as enterprise size, number of sites, connectivity constraints, etc. Two additional dimensions also play a key role in determining optimal deployment architecture: 1. The nature of services being delivered 2. The integration between services and the operator’s […]

CEOs: In the “Geek Era”, Human Bonds are Essential

Wednesday, July 20, 2016

In our screen-saturated world where new methods of communication are thriving, it is paramount to reaffirm the key role of human relations. This is just as true in the business world, and every CEO should be committed to preserving and developing social ties. Screens, smartphones, tablets and computers have invaded our daily lives (as of […]

vCPE Offerings: Learning from Past Mistakes

Thursday, May 12, 2016

With OTT services for consumers, most operators have seen potential revenues “slip through” their networks; vCPE gives them the opportunity to capture and consolidate a bigger share of the enterprise market. But for that to happen, they have to offer flexible deployment options. There are two basic architectures for virtual CPE deployment: (1) a centralized […]

vCPE: Crossing the Chasm in 2016?

Thursday, April 14, 2016

Up to 15% of new enterprise network connections will use vCPE in 2016. This is what a majority of respondents indicated in a recent poll*. After having seen vCPE rise to the top of proposed NFV use cases and reading multiple articles about operators trials for such services, it looks like 2016 will be the […]

The New Winning Combination: Open Networking + Traffic Intelligence

Thursday, December 10, 2015

The telecom sector is undoubtedly poised to push for more technological enhancements – on software and hardware ends – as demand for data and mobile services, specifically digital services continuous to grow. Amid the many changes that are taking place across various network functions, open networking and traffic intelligence is set to experience some of […]

Don’t Try This at Home! Why Should DPI Be Left to a Specialist?

Tuesday, December 1, 2015

There are some things you should NOT try to do yourself. Building and maintaining Deep Packet Inspection (DPI) technology is an example of something most companies should not try to do themselves. DPI and IP classification are key technologies residing inside modern networking equipment, used to optimize traffic, to measure quality of experience, or to […]

We use cookies to improve and personalize your browsing experience. This site may also include cookies from third parties. By using this site, you consent to the use of cookies. Read more

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.