Network Intrusion Detection and Analysis News
April 22, 2015
Huawei's U.S. CSO pitched the rigor of its supply chain security processes to RSA Conference 2015 attendees, but they remained skeptical at best on whether to trust the Chinese networking and security vendor.
January 23, 2015
A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.
November 26, 2014
A10 gives users more ammunition in the never-ending battle to combat DDoS attacks.
October 29, 2014
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
Network Intrusion Detection and Analysis Get Started
Bring yourself up to speed with our introductory content
Many organizations deploy security information and event management systems without the proper planning and therefore can't reap the proper rewards. Expert Kevin Beaver offers tips for a successful implementation. Continue Reading
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down. Continue Reading
Evaluate Network Intrusion Detection and Analysis Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Does the standalone intrusion prevention system still have a place in the enterprise? Readers vote on this year's top IPS products. Continue Reading
The information security industry needs to shift its focus to data-driven security. Continue Reading
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape. Continue Reading
Product ReviewsPowered by IT Central Station
Valuable features include signature based analysis and preventing different types of network attacks.Powered by IT Central Station
Valuable Features: Signature based analysis and preventing different types of network attacks. • Room for Improvement: The management...Continue Reading
Powered by IT Central Station
Valuable Features: Great user interface and stable • Improvements to My Organization: Very clear on the findings, great detection...Continue Reading
Powered by IT Central Station
Valuable Features: <ul> <li>Intrusion prevention</li> <li>Digital vaccines</li> <li>Profile...Continue Reading
Manage Network Intrusion Detection and Analysis
Learn to apply best practices and optimize your operations.
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall. Continue Reading
Readers choose the best intrusion detection/prevention products. Continue Reading
Problem Solve Network Intrusion Detection and Analysis Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading
A few simple security best practices may have spared security company HBGary Federal from the recent attack by the hacktivist group Anonymous. Nick Lewis explains what happened and how to prevent such an attack against your company. Continue Reading