Intrusion detection systems News
April 08, 2014
Researchers who discovered the 'Heartbleed' OpenSSL security vulnerability say it could have exposed encrypted Internet traffic from millions of systems.
November 15, 2013
Database security specialist DB Networks introduces SQL security appliance to detect obfuscated malicious traffic.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
Intrusion detection systems Get Started
Bring yourself up to speed with our introductory content
An intrusion detection system (IDS) is a device or software application that alerts an administrator of a security breach, policy violation or other compromise that may adversely affect the administrator's information technology (IT) network. Continue Reading
This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS). Continue Reading
This series intends to serve as a very brief introduction to information security with an emphasis on networking. Part one describes the threat to the enterprise. Continue Reading
Evaluate Intrusion detection systems Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Cloud-based application security is becoming an increasingly prevalent concern. Uncover three key best practices for preventing security breaches. Continue Reading
Network administrators need to test internal systems such as firewalls and IPS/IDS devices to ensure their networks are safe. Continue Reading
Cut through the hype and learn the differences and benefits of intrusion detection and prevention systems. Continue Reading
Manage Intrusion detection systems
Learn to apply best practices and optimize your operations.
Mike Chapple offers an alternative to creating an intrusion detection system as well as advice on maintaining a signature database. Continue Reading
Using open source IDS Snort as an example, this tip offers eight best practices for securely deploying a network intrusion detection system. Continue Reading
Tenable Network Security's Security Center 3.0 Continue Reading
Problem Solve Intrusion detection systems Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Considering virtualization? Take into account that your IDS or IPS may not work the same way in a virtualized environment as it does in a physical one. Expert Dave Shackleford explains how to address this potential problem. Continue Reading
Make sure that your cloud computing environment is equipped to detect and respond to attacks with the appropriate intrusion detection systems. Continue Reading
Deploying an IDS and an IPS system may seem like two different tasks, but really the two are closely related. Mike Chapple weighs in on the similarities of the deployment strategies. Continue Reading