1
  • Intrusion from 255 network broadcast address

    We have about 25 computers on our network. All have F-secure client security installed. Today on several of them I get a pop-up stating that an intrusion attempt has been blocked from the .255 network broadcast address. This is the first time this has occurred. What could be some possible causes...

    Slvd5 pointsBadges:
  • HIPS

    My company currently has a HIPS solution that is end of life. We are researching all of the different products out there. What would be the key things to look for in a solution?

    Jjmillan5 pointsBadges:
  • HIDS

    Does host intrusion detection systems use heuristic based detection, which in turn uses a cipher key to determine if an alert should be triggered?

    EDUMEX12910 pointsBadges:
  • Why IPS?

    For those who use an IPS, what were your reasons for implementing it? Here's a tip on determining your IPS needs: http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1349855,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • How much should IT disclose post-intrusion?

    As SearchSecurity's recent podcast noted, Apache's recent security disclosure was unusual in how thorough it was. Just curious: What's your company's intrusion or malware disclosure policy, and are you happy with how it's implemented?

    Michael Morisy8,323 pointsBadges:
  • Can an IPS collect information of all layers like like which protocol and port numbers are being used or it can only sniff till layer 3 detail ?

    Hi. I have a scenario where an IPS is connected to the switch and is monitoring all the ports of it. I would like to know that whether this device can capture information till layer 3 (network layer) or it can capture full details of all seven layers, like which application, protocol and port is...

    Rahul Shrivastava330 pointsBadges:
  • Defense in depth and unified threat management appliances

    Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren't we...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Solutions for sniffing?

    Hello Guys. Can anybody help me know that how to protect traffic from being sniffed? One solution is encryption, anything else ? Your answers awaited. Cheers. Rahul

    Rahul Shrivastava330 pointsBadges:
  • Recommendations for hosted intrusion detection and prevention system vendor?

    Hello, I am looking for a 100% outsourced (hosted, managed, etc.) intrusion detection and prevention system vendor for use in the payment card industry. They should be able to demonstrate recognition of and compliance with PCI security parameters. Does anyone have any qualified recommendations...

    Billpoly0 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following