Juniper Networks IDP
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Juniper Networks IDP Series Intrusion Detection and Prevention Appliances won top honors from readers with high marks for effectively and accurately detecting, preventing and/or blocking attacks and suspicious activity. The appliances also received raves for their frequency of signature updates and reporting and alerting capabilities. Juniper Networks IDP uses signatures and other detection mechanisms.
3Com/TippingPoint Intrusion Prevention Systems
3Com/TippingPoint Intrusion Prevention Systems snagged the silver, drawing strong ratings in a number of areas, including frequency of signature updates, response to new threats and for effectively and accurately detecting, preventing and/or blockings attacks. The 3Com/TippingPoint IPS, an inline device, and is built on the TippingPoint ASIC-based Threat Suppression Engine to provide protection at gigabit speeds.
Sourcefire IPS, which is built on the open source Snort engine, earned the bronze with high scores from readers for its ability to effectively and accurately detect, prevent and/or block attacks. The product also scored well for frequency of signature updates and response to new threats. Sourcefire IPS combines vulnerability-based and anomaly-based inspection methods to analyze traffic.
"It's a good time to be an IDS/IPS provider because network equipment manufacturers are scrambling to partner with threat management vendors as they work to incorporate embedded network security features and intelligence into the network infrastructure for better visibility and enforcement for enterprises. Expect to see more partnerships like the one between HP and McAfee." -- Charlotte Dunlap, senior analyst, Synergy Research
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products