WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public. 

  • Review: Arbor Networks' Peakflow X 3.6

    Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. 

  • Sourcefire looking to go public

    The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed. 

  • Cisco fixes IOS, intrusion defense flaws

    Attackers could exploit the flaws to gain privileged access to a vulnerable device, bypass security restrictions or cause a denial of service. 

  • Trojan targets Microsoft PowerPoint flaw

    Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. 

  • Can Snort read multi-platform syslogs?

    Most security pros are aware of Snort's network intrusion detection capabilities, but can this freeware tool read and monitor multi-platform syslogs? SearchSecurity's network security expert Mike Chapple tackles this question in this Ask the Expert Q... 

  • Brief: Sourcefire addresses Snort flaw

    Sourcefire has issued an updated version of Snort to address a flaw that could allow malicious packets to damage Snort-protected computers. 

  • Security without firewalls: Sensible or silly?

    The San Diego Supercomputer Center has had only one compromise in nearly six years, without using a firewall. The SDSC's security manager explains how. 

  • Security Bytes: Snort systems vulnerable to attack

    Updated with a link to a third-party patch. Also: IBM rectifies a critical Kerberos flaw and Symantec's effort to battle against OneCare may have to wait. 

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa...