New & Notable
Network Intrusion Detection (IDS) News
March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
September 08, 2010
Martin Roesch remains the guiding force behind nearly all of the improvements made to Snort, which is at the heart of Sourcefire's network detection ...
Network Intrusion Detection (IDS) Get Started
Bring yourself up to speed with our introductory content
Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision ... Continue Reading
Malicious intruders are intent on breaking into your corporate systems. The latest IDS/IPS technologies, though, are effective means prevent or at least identify and minimize security breaches. Learn what IDS and IPS can do and what the concrete ... Continue Reading
A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed... Continue Reading
Evaluate Network Intrusion Detection (IDS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Pwn Phone can reportedly detect network vulnerabilities instantly, but its use in the enterprise is questionable. Kevin Beaver explains. Continue Reading
To protect your system it's essential to select an IDS/IPS offering that effectively blocks attacks and complements your existing security controls. Continue Reading
Evaluating IDS/IPS technology requires you to understand its capabilities and how they might complement your existing security infrastructure. Learn about the options available, and what to ask vendors, in order to select the best strategy for your ... Continue Reading
Manage Network Intrusion Detection (IDS)
Learn to apply best practices and optimize your operations.
The Department of Defense is using a converged network security architecture to simplify security management. Learn about the security benefits. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading
Uncover key continuous security monitoring tips enterprises can take away from the federal government's Continuous Diagnostics and Mitigation program. Continue Reading
Problem Solve Network Intrusion Detection (IDS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading
Brad Casey explores issues with giving Windows users admin rights to install and manage applications, and offers advice on mitigating inherent risks. Continue Reading
Use of microVMs for malware detection and isolation is growing, but expert Brad Casey cautions that the tactic isn't a cure-all for fighting malware. Continue Reading