WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What security risks do enterprise honeypots pose?

    Honeypots can provide a great deal of insight into an environment's attack activity. However, before implementing them, there are some significant issues that require careful consideration and planning. 

  • What are the benefits of 'in-the-cloud' network security services?

    Services offered 'in the cloud' range from managed firewalls to intrusion detection/prevention services (IDS/IPS) to antispam/antivirus filtering. In this expert Q&A, Mike Chapple reviews the pros and cons of these outsourced security services. 

  • Screencast: Snort -- Tactics for basic network analysis

    In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security. 

  • Can Snort stop application-layer attacks?

    Even though Snort can add an important layer of defense for applications, it won't fix the underlying problem of poorly written ones. Michael Cobb reveals a more efficient technique for patching up XSS and SQL injection vulnerabilities. 

  • Juniper UAC to deliver Shavlik patch management technology

    Patch management vendor Shavlik Technologies announced that its tools will now be enabled via Juniper Networks' Unified Access Control (UAC) product. 

  • What kinds of network packet data can be extracted from Snort IDS?

    Snort IDS may be able to track information on received network packets, but network security expert MIke Chapple explains what the intrusion detection system is best used for. 

  • Experts: IDS is here to stay

    IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. 

  • Can Snort be configured with a FreeBSD router?

    Just because you can use Snort, it doesn't necessarily mean that you always should. In this expert Q&A, Mike Chapple explains which network configuration scenarios call for the intrusion defense tool and which ones don't. 

  • Diffie-Hellman key exchange (exponential key exchange)

    Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code break... 

  • Buy vs. build: Choosing an enterprise intrusion detection system

    When it comes to intrusion detection systems, should you buy or build? In this SearchSecurity.com Q&A, network security expert Mike Chapple explains when an enterprise should use a commercially supported product.