WhatIs definition: Inline network device

Network Intrusion Detection (IDS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Trojan targets Microsoft PowerPoint flaw

    Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. 

  • Brief: Sourcefire addresses Snort flaw

    Sourcefire has issued an updated version of Snort to address a flaw that could allow malicious packets to damage Snort-protected computers. 

  • Security without firewalls: Sensible or silly?

    The San Diego Supercomputer Center has had only one compromise in nearly six years, without using a firewall. The SDSC's security manager explains how. 

  • Security Bytes: Snort systems vulnerable to attack

    Updated with a link to a third-party patch. Also: IBM rectifies a critical Kerberos flaw and Symantec's effort to battle against OneCare may have to wait. 

  • With intrusion defense vendors, one size doesn't fit all

    In the final installment of our special series, Intruder Alert, a majority of IT shops say they rely on Cisco and Symantec for intrusion defense, but others say they're just as happy using free open source tools. 

  • To executives, intrusion defense is a hard sell

    Security administrators say intrusion defense frustrates them not only because executives are reluctant to buy in, but also because even the top products have a long way to go. 

  • Ideal intrusion defense combines processes and people

    What defines good intrusion defense? In the first installment of our special three-day series, Intruder Alert, IT pros say the best programs not only thwart insiders with bad computing habits, but also the spyware and other malware they let in. 

  • Intruder Alert: Looking at the numbers

    In February, SearchSecurity.com surveyed 307 IT professionals from a variety of industries regarding their intrusion defense programs. Here is a look at some of the questions we asked and the answers they gave. 

  • Network tool stops security threats dead in their tracks

    One vendor's new security analyzer tool puts developing products through a vulnerability torture chamber to identify zero-day threats. 

  • Security Wire Weekly: No deal for Snort, victory for Google and love versus productivity on the job

    This week, a talk with Kansas City Snort User Group Founder Russ Starr on the future of Snort amid the recent collapse of the Check Point-Sourcefire deal; plus details on an upcoming Microsoft fix, Google's recent court victory and looking for love i...