Monitoring security tools

Posted on 2010-09-01
Last Modified: 2012-06-27
Splunk event monitoring



Which one would you guys recommend and would are some other tools would you recommend instead.
Question by:Tiras25
LVL 77

Accepted Solution

arnold earned 250 total points
ID: 33579437
You can use an IPS,snort.

It all depends on what it is you are securing and monitoring.

the three you mentioned are good and might fit your needs which are currently unkown.


Assisted Solution

karephre earned 250 total points
ID: 33581052
Do you want to detect(IDS tools) or prevent (IPS tool). IDS will give you a log of things that happen. IPS will change your network to to protect it.
LVL 17

Author Closing Comment

ID: 33581925
Good enough.

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to restore security permissions on a file server 4 54
Internet Protocol Security question 3 66
User Level Security 6 34
How do You Stop a DDoS Attack 7 26
Last week, our Skyport webinar on “How to secure your Active Directory” ( provided 218 attendees with a step-by-step guide for identifying Acti…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now