Network Intrusion Detection (IDS) News
February 23, 2015
Use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve traffic visibility on internal applications.
March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Detection (IDS) Get Started
Bring yourself up to speed with our introductory content
Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor. Continue Reading
The IT pro's job is to ensure the enterprise has the best network security possible while providing peak performance. Our guide provides solid steps to take right now. Continue Reading
Breach detection systems are gaining steam, but when would they be more appropriate to use than an IDS or NGFW? Expert Kevin Beaver explains. Continue Reading
Evaluate Network Intrusion Detection (IDS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading
Expert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading
There are many factors to consider when selecting a security incident and event management (SIEM) product. Read on to learn about the latest SIEM tech advances. Continue Reading
Product ReviewsPowered by IT Central Station
Its default filters include, among 2300 others, protection against buffer overflows and malicious downloads, but be sure to make baseline audits and incident-handling protocols upon deployment.Powered by IT Central Station
Valuable Features: It ships with a default profile that enables approximately 2300 filters for items that should never legitimately exist on a...Continue Reading
Sorting/Blocking/Searching can be done in one or two moves, although it should provide dashboard on-line alerting about current attacks and their sources.Powered by IT Central Station
Valuable Features: Quick and professional service Customer filter creation/deployment Easy-in-use Quick and simple installation without...Continue Reading
Valuable features include signature based analysis and preventing different types of network attacks.Powered by IT Central Station
Valuable Features: Signature based analysis and preventing different types of network attacks. • Room for Improvement: ...Continue Reading
Manage Network Intrusion Detection (IDS)
Learn to apply best practices and optimize your operations.
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading
Microsegmentation and zones of zero trust are security strategies inherent in software-defined networking. Expert Kevin Beaver explains how to get started. Continue Reading
Cyberhunting can be a critical component of enterprise security. Expert Eric Cole explains how it can prevent attacks. Continue Reading
Problem Solve Network Intrusion Detection (IDS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Network Address Translation - Port Mapping Protocol implementations may cause vulnerabilities on networking devices. Expert Kevin Beaver offers pointers for testing and mitigating such risks. Continue Reading
When it comes to threat prevention and detection in the enterprise, 'known good' technologies can be critical, yet also introduce complexity. Learn whether known-good security can bolster your security program. Continue Reading
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading