• Do you have adequate security tools in place to quickly detect and react to an intrusion?

    Fran Sales870 pointsBadges:
  • Snort Intrusion Detection and Prevention Guide

    Answers to frequently asked questions related to the open source Snort intrusion detection and prevention system.

    ITKE346,195 pointsBadges:
  • Which do you think provides better security — IDS or IPS?

    searchsecurity21,055 pointsBadges:
  • Choosing an intrusion detection system: Network, host or application-based IDS

    Different types of intrusion detection tools do different jobs. This tip offers help comparing three different types of IDS devices: network, host and application-based IDS.

    Brien Posey9,455 pointsBadges:
  • intrusion detection (ID)

    Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization)...

    ITKE346,195 pointsBadges:
  • Rootkit levels of infection and mitigation

    PaX team developers Ed Tittel and Justin Korelc describe St. Jude and St. Michael intrusion detection systems as coutermeasures against hackers' exploitive use of rootkit.

    Etittel4,750 pointsBadges:
  • Wireless intrusion detection systems can double as WLAN monitors

    Did you know that your customer's wireless intrusion detection systems can complement existing wireless traffic analyzers? Learn how WIDS can help with performance analysis, alerts, troubleshooting and reporting in this tip.

    searchsecurity21,055 pointsBadges:
  • Intrusion detection for Linux a challenge

    In this interview, NetIQ managers try to fill in some of the security gaps in Linux and address what keeps administrators up at night.

    Jan Stafford2,895 pointsBadges:
  • OSSEC: The server and agent model

    Get the benefit of regular alerts and status reports from configuring open source IDS/IPS OSSEC to run as a server and agent model.

    JTurnbull490 pointsBadges:
  • Improving Snort performance with Barnyard

    Increasing the speed and efficiency of intrusion-detection system application Snort means reduced false positives and more focus on actual threats. You can do this with Barnyard, a third-party application that leaves Snort with more capacity to scan/analyze anomalies and attacks.

    JTurnbull490 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.