WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Educate users about security awareness

    User education is one of the hardest security layers for administrators to implement. This article by contributor Tony Bradley provides the top ten things users should know about information security. 

  • Integrated security solutions

    Our security management expert examines how the continual insider threat warrants the need for integrated security solutions and explains how creating a self-defending network helps meet this need. 

  • IDS: Still head of the class in security education

    Despite its "old school" image, a technologist at the CSI Computer Security Conference says intrusion detection offers quite an education in network security. 

  • Using attack responses to improve intrusion detection

    IPSes must detect an attack as it comes into the network; however, IDSes have the advantage of identifying an intrusion based on incoming our outgoing network traffic. 

  • U.S. Postal Service delivers intrusion prevention

    Security Seven award winner Charles McGann discusses how the USPS successfully applied intrusion prevention solutions across their enterprise and how you can do so across your own. 

  • Layered access control: 6 top defenses that work

    Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. 

  • Intrusion prevention: What's next?

    This presentation by Scott Sidel assesses the current product landscape in the intrusion detection, prevention and active defense market. 

  • How to build a secure network from the ground up

    Receive peer advice on what steps are crucial when building a secure network from the ground up. Also learn what resources are available to guide you through this process. 

  • Snort update fixes security hole

    Attackers could exploit a flaw in the open source IDS to gain unauthorized network access, security firms warn. But a fix is available. 

  • Snort users fear future under Check Point

    With Check Point acquiring Sourcefire and its Snort open source IDS, users fear it may be the beginning of the end for one of the industry's most popular security tools.