WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Enterprise network security visibility: Beyond traditional defenses

    Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... 

  • Essentials: Threat detection

    Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises have to be nimble on the security front in order to keep data safe and attackers at bay. This Essenti... 

  • Network security best practices and essentials

    Your network security is increasingly complex and the ostensibly simple matter of just keeping track of its components has spawned a slew of network discovery tools. But if that complexity weren’t enough, the attacks that chew at your network every d... 

  • IDSes takes aim: Emerging "target-based" systems improve intrusion defense

    Network intrusion detection systems (NIDSes) generate a lot of false positives, false alerts and false alarms. They've driven many frustrated security managers to simply pull the plug on their NIDSes. "Target-based IDS" is a new technology that corre... 

  • Defense-in-Depth: Securing the network from the perimeter to the core

    Enterprise networks are no longer a "crunchy shell around a soft, chewy center" and hence network defenses must be deployed inside the perimeter. But are network security vendors capable securing the network from the inside out? Also: Andrew Briney's... 

  • Trustworthy yet? An inside look at what's changed after a year of Microsoft Trustworthy Computing

    When Bill Gates launched Trustworthy Computing at Microsoft, it was meant to fundamentally change the way the software giant operates. But has anything really changed? This month, we examine what's happened in the past 12 months, and the work left to... 

  • inline network device

    An inline network device is one that receives packets and forwards them to their intended destination. 

  • micro VM (micro virtual machine)

    A micro VM (micro virtual machine) is a virtual machine program that serves to isolate an untrusted computing operation from a computer's host operating system. 

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. 

  • network behavior analysis (NBA)

    Network behavior analysis (NBA) is a method of enhancing the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation... (Continued) 

  • HIDS/NIDS (host intrusion detection systems and network intrusion detection systems)

    Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks... (Continued) 

  • Diffie-Hellman key exchange (exponential key exchange)

    Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code break... 

  • ultrasound

    Ultrasound is acoustic (sound) energy in the form of waves having a frequency above the human hearing range. 

About Network Intrusion Detection (IDS)

Find intrusion systems, tools and tactics, such as Snort and Nessus, designed to help you manage host-based and network-based IDSes, minimize false positives, and learn how to use intrusion detection methods and devices to create a solid and secure network foundation.