News

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs. It used to be so easy. Everything ...
Intrusion detection technology presents a confusing array of acronyms, abstract concepts, and hazy deliverables. This exacerbates the difficult situation for executives who are asked to pay for these ...
The risk of hacking attacks and network intrusions are facts of life for everyone who ventures online. Your system's firewall and its intrusion detection system both work to protect you against such ...
We have a SonicWall firewall and would like to add intrusion detection to the network. The principal of the company is asking about options that sit between the firewall and network. The SonicWall ...
Security advances push intrusion detection deeper into the network, relegating its role to forensics investigation and internal monitoring. Drowning in signature libraries and reactive event ...
Uncle Sam likes his networks buttoned down, which means firewalls just won’t cut it. True, the newer firewalls include limited IDS (intrusion detection system) or IDP (intrusion detection and ...
Arkansas State University is asking for trouble. The school is in the midst of a major network upgrade that will eventually bring gigabit-speed network capacity to every dorm room and office on campus ...
Connecting to the Internet provides an additional access point to millions of potential customers. Yet without proper precautions, opening the door to Web-based business initiatives creates ...
The product life-cycle management project I mentioned in my last article has been quiet as the project management team evaluates everyone’s input to the evaluation documentation. I’m taking this ...
I am operating a small environment that has 7 or 8 basic security zones, with a Fortigate 60c sitting in the middle acting as traffic cop. I have noticed that even lightly loaded, the Fortigate seems ...