BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Evaluating intrusion detection and prevention systems and vendors

Last updated:February 2015

Editor's note

Malicious intruders are intent on breaking into corporate networks. The latest intrusion detection and prevention systems (IDS/IPS), however, are an effective means of preventing or at least identifying and minimizing security breaches. However, understanding IDS/IPS technology, its features and functionality, and the vendors in the marketplace can be a harrowing task.

In this guide featuring security expert Bill Hayes, get a handle on intrusion detection and prevention systems -- including what the technology is, understanding its use in an enterprise setting, and even performing an evaluation of vendors and their products to find the one that would best suit your organization's security needs.

Whether you just want to learn more about IDS/IPS technology or need help working a product into your enterprise's security strategy, this guide will help you every step of the way.

1The benefits and technical details of IDS/IPS

When evaluating intrusion detection and prevention systems, it is critical to understand not only the features and functionality of the technology, but also how it will integrate into an organization's existing security strategy. Learn about the IDS/IPS options available and the multiple benefits they bring to the enterprise.

2Evaluating IDS/IPS vendors and products

The intrusion detection vendor landscape is a broad and often confusing place. Knowing the proper questions to ask vendors about their products, however, can greatly ease the evaluation process. Get started here.

3Sealing the deal on IDS/IPS

To effectively protect an enterprise network, it is critical to find the IDS/IPS technology that both blocks attacks and complements the organization's existing security controls. Get help evaluating IDS/IPS systems and uncover final considerations to keep in mind before signing on the dotted line.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close