Tools for deep packet inspection, logging and metadata collection became vital for IT and IT security teams to do their job, i.e. keeping a certain level of control over their perimeter and networks.
Tools for deep packet inspection, logging and metadata collection became vital for IT and IT security teams to do their job, i.e. keeping a certain level of control over their perimeter and networks.