Intrusion detection and prevention: IDS/IPS security guide

This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS).

More on intrusion detection and prevention

Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels

Learn why it may be better to stick with commercial or open source IDS products.

Joel Snyder explains which tools can secure a network perimeter and boost an intrusion defense strategy.

It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. And one of the major components in that strategy is having solid intrusion detection and intrusion prevention technology and supporting processes.

This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS).

                                                  TABLE OF CONTENTS

Network intrusion detection system basics

Here, security professionals will gain some insight on the basics of network intrusion detection systems by learning how to determine which IDS/IPS technology is right for their enterprises as well as the key differences between the IDS and IPS technologies.

Intrusion detection and prevention tools

Security managers and professionals will learn not only about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market, but also how to use them. 

Intrusion detection and prevention system deployment

Security managers and staff will learn about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market today, as well as how to use them.

Wireless intrusion detection and prevention

Enterprises will learn more about wireless intrusion detection and prevention systems and WLAN security, including how to use a WIPS to monitor wireless traffic and how to set up and manage a WIPS.

 

This was first published in May 2012

Dig deeper on Network Intrusion Detection (IDS)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close