New & Notable
Network Intrusion Detection (IDS) News
March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
September 08, 2010
Martin Roesch remains the guiding force behind nearly all of the improvements made to Snort, which is at the heart of Sourcefire's network detection ...
Network Intrusion Detection (IDS) Get Started
Bring yourself up to speed with our introductory content
When it comes to threat prevention and detection in the enterprise, 'known good' technologies can be critical, yet also introduce complexity. Learn whether known-good security can bolster your security program. Continue Reading
Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision ... Continue Reading
Malicious intruders are intent on breaking into your corporate systems. The latest IDS/IPS technologies, though, are effective means prevent or at least identify and minimize security breaches. Learn what IDS and IPS can do and what the concrete ... Continue Reading
Evaluate Network Intrusion Detection (IDS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading
The Pwn Phone can reportedly detect network vulnerabilities instantly, but its use in the enterprise is questionable. Kevin Beaver explains. Continue Reading
To protect your system it's essential to select an IDS/IPS offering that effectively blocks attacks and complements your existing security controls. Continue Reading
Manage Network Intrusion Detection (IDS)
Learn to apply best practices and optimize your operations.
Dr. Eric Cole explains how the use of crypto-free zones to prevent last-mile network encryption can thwart stealthy advanced attacks that often go undetected. Continue Reading
The Department of Defense is using a converged network security architecture to simplify security management. Learn about the security benefits. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading
Problem Solve Network Intrusion Detection (IDS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading
Uncover key continuous security monitoring tips enterprises can take away from the federal government's Continuous Diagnostics and Mitigation program. Continue Reading
Brad Casey explores issues with giving Windows users admin rights to install and manage applications, and offers advice on mitigating inherent risks. Continue Reading