Access "Best intrusion detection/prevention products 2011"
This article is part of the September 2011 issue of The top 2011 security products: Information Security Readers' Choice Awards
gold winner Sourcefire IPS Sourcefire www.sourcefire.com Readers gave Sourcefire’s IPS the highest ratings for intrusion detection and prevention. Readers noted the product works accurately and effectively, with solid alerting and reporting features. When asked about return on investment, readers felt Sourcefire IPS gives them a good return for their money. Sourcefire IPS has its roots in Snort, an open source intrusion detection and prevention tool created by the founders of Sourcefire. The product itself is not open source (our readers evaluated the commercial version of Sourcefire’s IPS), but it can receive alerts from Snort for customers who already have Snort installed. Sourcefire IPS sensors operate in either inline or passive mode. Sourcefire IPS provides intrusion detection and blocking, dashboard and reporting, policy management and Snort rule editing. It is backed by Sourcefire’s Vulnerability Research Team (VRT), which aims to proactively discover and respond to various attacks and intrusion activities. The VRT uses this information to populate ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
2011 Information Security magazine Readers' Choice Awards
by Information Security Staff
Readers pick the best security products.
-
Best authentication products 2011
by Information Security Staff
Readers choose the best authentication products.
-
Best intrusion detection/prevention products 2011
by Information Security Staff
Readers choose the best intrusion detection/prevention products.
-
Best network access control products 2011
by Information Security Staff
ISM readers choose the best network access control products of 2011. See who won the gold.
-
Best secure remote access products 2011
by Information Security Staff
Readers choose the best secure remote access products.
-
Best unified threat management products 2011
by Information Security Staff
Readers choose the best unified threat management products.
-
Best Web application firewalls 2011
by Information Security Staff
Our readers selected their favorite Web application firewalls. See which product took the top spot.
-
Framework for building a vulnerability management lifecycle, program
by Diana Kelley
A robust vulnerability management program requires the integration of inventory, change and configuration management.
-
2011 Information Security magazine Readers' Choice Awards
by Information Security Staff
-
-
Best antimalware products 2011
by Information Security Staff
Readers rank the best antimalware products.
-
Best identity and access management products 2011
by Information Security Staff
Readers choose the best identity and access management products.
-
Best messaging security products 2011
by Information Security Staff
ISM readers choose the best messaging security products of 2011. See which one took home the gold.
-
Best policy and risk management products 2011
by Information Security Staff
Readers choose the best policy and risk management products 2011.
-
Best security information and event management products 2011
by Information Security Staff
Readers choose the best security information and event management products.
-
Best vulnerability management products 2011
by Information Security Staff
Readers choose the best vulnerability management products.
-
Best Web security products 2011
by Information Security Staff
Readers choose the best Web security products
-
Microsoft BlueHat prize wins over Black Hat Crowd
by Robert Westervelt
Security pros say Microsoft’s contest to encourage development of new security technologies for its products is promising.
-
Best antimalware products 2011
by Information Security Staff
-
Columns
-
Ranum chat: Enterprise information security architecture
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider. This month, Marcus talks to Gunnar Peterson, managing principal at Arctec Group, where he focuses on distributed systems security for large enterprise systems.
-
Organizations need a new data security model to combat today’s threats
by Phil Gardner and Chris Silva
Modern threats require a fundamental shift in information security away from the fortress mentality.
-
Bring back the lulz by changing up your information security model
by Michael S. Mimoso, Editorial Director
Security needs more lulz, but it’s not happening until we change our protection models, understand how our respective businesses work and concentrate on current threats and adversaries.
-
Ranum chat: Enterprise information security architecture
by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO