Solved

IDS device recommendations

Posted on 2011-09-24
3
413 Views
Last Modified: 2013-11-29
Hi EE,

My company is looking to purchase an IDS device to protect our publicly accessible web servers. We are mostly a juniper outfit so i have looked at some of the juniper IDS devices available, but i would like to know what else you recommend. Since this is a new direction we are open to exploring alternatives.
0
Comment
Question by:Sanga Collins
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 125 total points
ID: 36592888
Tippingpoint is a good choice.
There is also Cisco IDS, but i would not recommend it.
I have personally worked with RealSecure ISS, now IBM. Its pretty good with a good interface to manage it.
IDP module from juniper too is not up to the mark.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 125 total points
ID: 36594570
Search at google "magic quadrant for network intrusion preventation system application"
http://www.stonesoft.com/en/campaigns/gartner_ips_magic_quadrant/  ...Download This Report.
0
 
LVL 18

Author Comment

by:Sanga Collins
ID: 36717547
Thanks guys, your comments have definitely got me going on the right path. i was hoping i could stick with juniper, but more research has led me to the conclusion that it may not be the best device for the job!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question