intrusion

Review: NetScreen IDP1000

Review: NetScreen IDP1000

NetScreen (now part of Juniper Networks) sent us the IDP 1000 to review.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: TippingPoint Unity One-200

Review: TippingPoint Unity One-200

Of all of the products we tested, TippingPoint Unity One-200 was the fastest and easiest to install.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
The case for intrusion prevention

The case for intrusion prevention

There have been many cases reported in both trade and national press recently about the increasing threat of cyber attacks, and the methodology employed to exploit vulnerabilities in security implementations. Despite this increased emphasis on the reality of the threat, many organisations are ignoring the advances in security products and technologies that can significantly increase their resistance to these attacks.
Paul Lawrence Jun 8 2004 11:42AM Security
Consultants view: This intrusion is no test

Consultants view: This intrusion is no test

Gunter Ollmann explains why test environments are a security weakness in need of some serious attention
Gunter Ollmann Apr 5 2004 4:36PM Security
Review: McAfee Entercept

Review: McAfee Entercept

Produced by McAfee, and the only Host-based IPS (HIPS) tested, Entercept monitors events at the operating system or application server level. As it does not deal with network-based exploits, it is very complementary to existing solutions that deal with attacks on that level, such as firewalls and network-based IDS or IPS products. The latest version adds welcome new features such as a new licensing scheme, key backup capabilities, additional reports, OS lockdown and custom signatures, as well as numerous improvements "under the hood."

Bob Walder Mar 25 2004 12:00AM Security
Review: McAfee IntruShield 4000

Review: McAfee IntruShield 4000

Based on standard and custom-designed processors, the NAI IntruShield system is a high-performance appliance that offers real-time network intrusion detection and prevention against known and unknown, denial-of-service (DoS) attacks for enterprise networks.

Bob Walder Mar 25 2004 12:00AM Security
Review: Internet Security Systems Proventia G200

Review: Internet Security Systems Proventia G200

Proventia G Series is a new range of turnkey intrusion prevention appliances from ISS. They are designed to proactively block malicious attacks from entering the network, including denial-of-service (DoS), intrusions and malicious code, backdoors and hybrid threats like MS Blaster or SQL Slammer. Proventia G Series blocks attacks in real-time, minimizing the need for active administrator involvement in most security events.

Bob Walder Mar 25 2004 12:00AM Security
Review: NetScreen-IDP 500

Review: NetScreen-IDP 500

The IDP-500 is a turnkey appliance-based system which uses as many as eight detection methods to detect malicious network traffic. This Intrusion Detection and Prevention (IDP) System is capable of operating in in-line mode as an Intrusion Prevention System (IPS) or as a passive Intrusion Detection System (IDS) attached to a span or mirror port on a switch.

Bob Walder Mar 25 2004 12:00AM Security
Review: TippingPoint UnityOne-1200

Review: TippingPoint UnityOne-1200

Based on custom-designed high-speed security processors, the UnityOne network-based Intrusion Prevention Appliances (IPA) and Intrusion Prevention Systems (IPS) are designed to stop cyberattacks in the network before such attacks can infect, damage or destroy core IT assets.

Bob Walder Mar 25 2004 12:00AM Security
Review: Attack Mitigator IPS 2400

Review: Attack Mitigator IPS 2400

Top Layer's Attack Mitigator IPS is actually a family of ASIC-based Network Intrusion Prevention Systems (NIPS), with blocking and control against certain types of cyber attacks. The product tested is the Attack Mitigator IPS 2400, a combination of multiple Attack Mitigator IPS 1000 and load-balancer units.

Bob Walder Mar 25 2004 12:00AM Security
Network Intrusion Detection 3rd edition

Network Intrusion Detection 3rd edition

The next incarnation of the excellent network intrusion detection manual from SANS's Stephen Northcutt and Judy Novak is here.
Stephen Northcutt Jan 15 2004 12:28PM Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans Jan 15 2004 11:45AM Security
Intrusion Detection: Let’s Make Some Real Progress, Today!

Intrusion Detection: Let’s Make Some Real Progress, Today!

It would be nice if most intrusions were detected, but they are not.
Brad C. Jan 15 2004 11:26AM Security
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Arnt Brox Jan 14 2004 1:23PM Security
Intrusion Prevention and Detection: Are They Just Missing the Point?

Intrusion Prevention and Detection: Are They Just Missing the Point?

Organizations know they must protect themselves from the mysterious enemy that is a ‘hacker’ and viruses such as LoveLetter, but often there is a misguided belief that these external threats are the main risks to businesses.
Jean-Charles Barbou Jan 9 2004 3:59PM Security
Review: McAfee Entercept

Review: McAfee Entercept

The Entercept system, now acquired by Network Associat-es, has in its latest version bought a major revision to how software runs in the enterprise.

René Millman Jul 1 2003 12:00AM Security
Review: ActiveScout Site Solution and Enterprise Solution

Review: ActiveScout Site Solution and Enterprise Solution

Accomplished hackers will always perform some sort of reconnaissance on a target network before mounting an attack - finding out details such as operating system types, application version, etc. The idea behind ActiveScout is that if the application can detect this activity it can later prevent it. Bogus host or port data traffic is marked, and the application responds to any future activity it thinks is coming from an attacker with such marked data. It then blocks the packets and stops any damage ever occurring.

René Millman Jul 1 2003 12:00AM Security
Review: Attack Mitigator IPS 1000

Review: Attack Mitigator IPS 1000

Top Layer Networks' Attack Mitigator lies at the traditional end of intrusion prevention. It aims to defend against both internal and external hackers using denial-of- service (DoS) and distributed denial-of-service (DDoS), as well as giving broad protection against other well-known attacks. This is done using a mixture of stateful inspection hardware and packet inspection software.

René Millman Jul 1 2003 12:00AM Security
Review: Primary Response

Review: Primary Response

Primary Response is the first product to come from Sana Security (formerly Company 51). The software is based on research that began in the mid-nineties and uses techniques more akin to the human immune system than conventional network security.

René Millman Jul 1 2003 12:00AM Security
Review: RealSecure Guard

Review: RealSecure Guard

This product essentially takes over from where BlackICE Guard left off. The current version offers greater protocol analysis pattern-based detection and a few bug fixes thrown in for good measure.

René Millman Jul 1 2003 12:00AM Security

Log In

  |  Forgot your password?