WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Cisco fixes Unified CallManager, Unified Presence Server flaws

    Also: Microsoft warns of a new Windows zero-day threat and investigates a reported flaw in Vista. 

  • Intrusion Defense School

    Your organization's ability to fend off spyware, computer viruses and the latest breed of information security threats hinges on the strength and cohesion of your ... 

  • How IDS-IPS enables business objectives

    In this lesson, learn how key network security practices and technologies can be mapped to business needs 

  • Can intrusion prevention systems alone prevent botnet attacks?

    Network-based intrusion prevention systems offer some protection against botnets, but that's only one piece of the puzzle. In this SearchSecurity.com Q&A, information security threat expert Ed Skoudis reviews the other tools that should be a part of ... 

  • Snort: A capable network intrusion prevention tool

    Most security practitioners have heard of the open source network intrusion detection system, Snort. For those who haven't, however, contributor Scott Sidel highlights the tool's ability to monitor traffic, log packets and analyze protocols. See how ... 

  • Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products. 

  • TJX faces lawsuit over data breach

    A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month. 

  • Don't let trends dictate your network security strategy

    As with most industries, the information security field has certainly seen its fair share of trends come and go. While some, like network access control, prove to be beneficial, others have proven to be risky. In this tip, Mike Chapple details why on... 

  • Review: Lancope StealthWatch 5.5 offers more than IDS

    Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. 

  • Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.