Network Intrusion Detection (IDS) News
February 23, 2015
Use of Cisco's OpenAppID application-layer traffic-detection tool is still modest compared to Snort, but the networking giant says it can help enterprises improve traffic visibility on internal applications.
March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Detection (IDS) Get Started
Bring yourself up to speed with our introductory content
A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless LAN network's radio spectrum for rogue access points and other wireless threats. Continue Reading
Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know. Continue Reading
Intrusion detection and preventions systems can be critical components to an enterprise's threat management strategy. Learn the history behind the technologies and why they are so important. Continue Reading
Evaluate Network Intrusion Detection (IDS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Footprinting can often lead to cyberattacks on an enterprise. Expert Ernie Hayden explains the footprinting technique and how it's performed. Continue Reading
Security expert Bill Hayes discusses the top benefits of intrusion detection systems, including identifying and preventing security incidents, protecting vulnerable assets, improving ROI and more. Continue Reading
Before making an investment in an intrusion detection and prevention system, be sure to read this list of five final considerations to keep in mind during intrusion detection system evaluation. Continue Reading
Manage Network Intrusion Detection (IDS)
Learn to apply best practices and optimize your operations.
Dr. Eric Cole explains how the use of crypto-free zones to prevent last-mile network encryption can thwart stealthy advanced attacks that often go undetected. Continue Reading
The Department of Defense is using a converged network security architecture to simplify security management. Learn about the security benefits. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading
Problem Solve Network Intrusion Detection (IDS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When it comes to threat prevention and detection in the enterprise, 'known good' technologies can be critical, yet also introduce complexity. Learn whether known-good security can bolster your security program. Continue Reading
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading