Skip to content
Contact technical expert

Cubro Blog

See the latest Cubro news, product updates, network visibility use cases and network technology trends and best practices. Keep track of Cubro’s latest technology and stay in the loop.

What has Network Traffic Filtering ever done for us?

Network traffic filtering minimizes the quantity of necessary network traffic that is sent to network tools which result in network tools’ effectiveness and an increase in the efficiency of the tools. This extends the lifespan of the network tools and increases the return on investment.

Cubro joins Forescout Envision Partner Ecosystem supporting the defense of Enterprise of Things

Cubro has recently joined Forescout technology partner eco-system. Cubro’s Visibility solution supports the Forescout mission to actively defend the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing.

Cubro joins Fortinet Open Fabric Ecosystem

Cubro is excited to be part of the Fortinet technology ecosystem. Our joint solutions provide enhanced functionality and serviceability to Fortinet’s customers, demonstrating Cubro’s “Better Together” approach to partners. 

What have Network Packet Brokers ever done for us?

A Network Packet Broker is a physical or virtual switch-like device, but unlike a network switch a Network Packet Broker does not alter the network traffic passing through it in any way unless configured to do so.

Cubro achieves integration with McAfee Enterprise Network Security Platform

Cubro announced today that it has achieved technical integration of their Omnia Advanced Network Packet Broker product range with McAfee Enterprise’s Network Security Platform, enabling customers to deploy more robust security solutions and better protect their assets from ever-evolving cyber threats.

What has a network TAP ever done for us - Cubro

What has network TAP ever done for us?

The fundamental component of any successful visibility solution is the 100% reliable, accurate source of network traffic delivered by network TAPs used for network performance and security monitoring.

Graphic for blog post of network visibility and what it has done for us

What has network visibility ever done for us?

Network visibility solutions have evolved from tapping and aggregation use cases to delivering many essential use cases, which significantly contribute to organizations’ ability to retain existing customers, win new customers, manage costs, improve data security, achieve and maintain regulatory compliance.

What is Service Based Architecture for 5G System

What is Service Based Architecture for 5G System

The Service Based architecture for 5G systems represents a move towards a cloud implementation of the Core Network. Newer 5G Core Networks have been deployed using virtualised Network Elements to allow multiple Network Elements to operate using a shared underlying hardware platform.

Network visibility is insurance for your network

Network Visibility is Insurance for your Network

Every minute a critical network service, or the network itself, is down which results in lost revenue. Cubro’s line of Network Visibility and Monitoring products create the foundation for the same level of protection and risk mitigation that your company’s physical assets enjoy.

Cubro partners with Polystar to deliver 5G network and services solution to Hi3G

Recently, Cubro partnered with Polystar to offer an integrated 5G network and services solution to Hi3G. Cubro and Polystar have delivered Hi3G a scalable and advanced network monitoring platform that caters to the increased demands of the NFVI and 5GC infrastructure.

A Visionary Leader - Christian Ferenz, CEO, Cubro

CEO & Founder with Visionary Leadership

Cubro has shown a remarkable growth year after year since it was founded in 2003. It wouldn’t have been possible without the visionary leadership of Christian Ferenz, CEO of Cubro. The reason for the continuous success is the business advantage to our customers which we offer by developing innovative solutions.

Why network visibility is critical for security

Why network visibility is critical for security

You can only secure what you can see – network visibility is essential for security. Omnia, the latest network visibility device from Cubro, can be configured as a network security appliance with an integrated network TAP and Packet Broker by installing the appropriate software application.

Why network visibility is essential for successful Digital Transformation outcomes?

NPB technology can help businesses and organizations to significantly reduce the risk of not achieving or delaying a successful digital transformation outcome to help them increase their revenue, profitability and share value.

Value of network visibility solutions

The value of network visibility solutions for today’s Service Provider and Enterprises

Network visibility technology has been deployed by Service Providers and Enterprises for the last 15 years or so and remains as important to a successful business and IT outcomes today as it was then. The use cases for visibility technology have developed as networks have changed and are now able to provide new, incremental value to organizations. The blog examines the value of visibility solutions and the reasons why they are essential for the success of contemporary IT initiatives and business outcomes.

Cubro EXA8 for Open Source Projects

EXA8 for Open Source Projects

Cubro hosted the Elevate the EXA8 contest shortly after release to offer the open-source community a chance to develop unique applications on the EXA8 hardware. The final submissions to the contest highlight the diverse capabilities of the EXA8 and the ingenuity of the open-source community.

Cubro DPI Approach for Telecommunication

Deep Packet Inspection in Telecommunication

Deep Packet Inspection (DPI) is a technology that enables the network owner to analyse internet traffic, through the network, in real-time and to differentiate them according to their payload. DPI is often used for understanding the performance or behaviour of subscribers, which applications they use, how often etc. This helps operators to focus on improving service for important applications.

Security hygiene for remote workers part 3

Security Hygiene for Remote Workers: Part 4

In the previous installment we secured our Wi-Fi and discussed segmenting our network to the best of our ability. All this work will be for naught, however, if we allow malicious software in through our own actions. In this final installment we will examine user behaviour and review known avenues of exploits relative to the coronavirus outbreak.

The Wireless Network and Segmentation

Security Hygiene for Remote Workers: Part 3

In this section, we will turn our attention to the wireless portion of the home network because restricting access to our network from the outside world does little good if a bad actor can gain access to our LAN. When setting up our Wi-Fi we absolutely want to be using WPA2 with PSK at a minimum (That’s Wireless Protected Access 2 with Pre-Shared Key).

Sensitive Data and Work Compputer

Security Hygiene for Remote Workers: Part 2

In the previous article, we discussed what we can do to protect sensitive data while working remotely as well as good practices to secure our computer systems against malware and exploits. In this section, we will take a look at what could be the most neglected piece of equipment in your home network: your router.

blog-pic_Security-Hygiene-Remote-Workers_system_blog

Security Hygiene for Remote Workers – Part 1

With the spread of the SARS-COV-2 virus, responsible for COVID-19, an unprecedented number of people have found themselves working remotely. This brings a lot of new challenges to bear, not the least of which is simply putting together a workspace in the home. Unfortunately, a remote worker’s considerations shouldn’t end at simply gathering the tools to work remotely. It is very important during this time to be conscious of security practices regarding your computing habits and home network.