More on intrusion detection and prevention
Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels
Learn why it may be better to stick with commercial or open source IDS products.
Joel Snyder explains which tools can secure a network perimeter and boost an intrusion defense strategy.
It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. And one of the major components in that strategy is having solid intrusion detection and intrusion prevention technology and supporting processes.
This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS).
TABLE OF CONTENTS
Here, security professionals will gain some insight on the basics of network intrusion detection systems by learning how to determine which IDS/IPS technology is right for their enterprises as well as the key differences between the IDS and IPS technologies.
Security managers and professionals will learn not only about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market, but also how to use them.
Security managers and staff will learn about the features and capabilities of some of the most popular intrusion detection and prevention tools on the market today, as well as how to use them.
Enterprises will learn more about wireless intrusion detection and prevention systems and WLAN security, including how to use a WIPS to monitor wireless traffic and how to set up and manage a WIPS.
This was first published in May 2012