Intrusion prevention: What's next?

Scott Sidel, Senior Security Manager, Computer Sciences Corporation, presented this session at Information Security

    Requires Free Membership to View

Decisions Fall 2005.

Intrusion attempts occur at a staggering rate and few organizations have enough manpower to investigate all of the attacks. How do you keep everyone from malicious hackers to incompetent employees from harming your network? How do you stay focused on real threats? This session assesses the current product landscape in the intrusion detection, prevention and active defense market. Scott Sidel, a technical editor for Information Security magazine, covers the role IDS plays in a security architecture and offers tips for increasing "signals" (true positives) and reducing "noise" (false positives). He helps you determine the pros and cons of going in line with active defense and profiles the types of organizations that can most benefit from a positive security model. Sidel looks at the types of products that are truly effective, as well as arms you with the best ways to improve your staff's ability to analyze threats.

You learn:


    Visit our resource center for more tips and expert advice on intrusion detection

    View more presentations from some of the industry's foremost security practitioners

    Learn more about Information Security Decisions

  • The (real) value proposition for IDS/IPS
  • Where IDS/IPS works best in your network
  • What you should (and should not) expect when deploying IDS/IPS
  • What comprises a solid IDS/IPS program
  • How to avoid common IDS/IPS mistakes

Download this presentation

This was first published in October 2005

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.