New & Notable
Network Intrusion Detection (IDS) News
March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
September 08, 2010
Martin Roesch remains the guiding force behind nearly all of the improvements made to Snort, which is at the heart of Sourcefire's network detection ...
Network Intrusion Detection (IDS) Get Started
Bring yourself up to speed with our introductory content
A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed... Continue Reading
A Google hack honeypot is a system designed to be vulnerable to sophisticated search engine queries for the purpose of attracting hackers and studying their behavior. Google hacking (sometimes called Google dorking) is the use of advanced search ... Continue Reading
A wireless intrusion prevention system (WIPS) is a second tier of security that protects a network from intrusion from an attacker accessing the network via Wi-Fi. WIPS hardware often looks much like a rack server while the associated sensors ... Continue Reading
Evaluate Network Intrusion Detection (IDS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The OpenAppID engine for Snort promises to enable organizations to create an open source application firewall. Kevin Beaver explores how it works. Continue Reading
Video: Martin Roesch discusses Cisco's plans to combine its policy-centric security technology with Sourcefire's threat-focused products. Continue Reading
Use of microVMs for malware detection and isolation is growing, but expert Brad Casey cautions that the tactic isn't a cure-all for fighting malware. Continue Reading
Manage Network Intrusion Detection (IDS)
Learn to apply best practices and optimize your operations.
The Department of Defense is using a converged network security architecture to simplify security management. Learn about the security benefits. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading
Uncover key continuous security monitoring tips enterprises can take away from the federal government's Continuous Diagnostics and Mitigation program. Continue Reading
Problem Solve Network Intrusion Detection (IDS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Brad Casey explores issues with giving Windows users admin rights to install and manage applications, and offers advice on mitigating inherent risks. Continue Reading
To solve the breach-detection issues highlighted in the 2013 Verizon DBIR, several intrusion detection techniques are needed, says expert Nick Lewis. Continue Reading
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses. Continue Reading