network intelligence

Video Streaming: A Hidden Threat to Enterprise Quality of Experience (QoE)
The Rise of Video Streaming Popularity As Disney gears up to launch its streaming service, joining Amazon, Apple, Facebook, and more, video streaming is being adopted into the daily routine of many ...

Brute Force Attacks on IoT – Here to Stay?
IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...

10 Ransomware Attacks You Should Know About in 2019
Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019 ...

DNS Attack on Yandex – Can It Happen to You?
Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google ...

Closed-Loop Automation: What it means for CSPs | Allot
Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – ...

Don’t be a Dumb Pipe! You CAN Analyze Encrypted Video Traffic
If you were to ask consumers in regulated countries what the main driver was for choosing their mobile service provider, chances are they’ll tell you that when it comes to data bundles ...

Pulling the Rug Out on DDoS Carpet Bombers
Network attacks driven by traffic, such as DDoS, have long been classified by a capacity threshold or baseline limit. When traffic surpasses that limit, an alarm is triggered to indicate an attack ...