Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

IDS device recommendations

Posted on 2011-09-24
3
Medium Priority
?
420 Views
Last Modified: 2013-11-29
Hi EE,

My company is looking to purchase an IDS device to protect our publicly accessible web servers. We are mostly a juniper outfit so i have looked at some of the juniper IDS devices available, but i would like to know what else you recommend. Since this is a new direction we are open to exploring alternatives.
0
Comment
Question by:Sanga Collins
3 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 500 total points
ID: 36592888
Tippingpoint is a good choice.
There is also Cisco IDS, but i would not recommend it.
I have personally worked with RealSecure ISS, now IBM. Its pretty good with a good interface to manage it.
IDP module from juniper too is not up to the mark.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 500 total points
ID: 36594570
Search at google "magic quadrant for network intrusion preventation system application"
http://www.stonesoft.com/en/campaigns/gartner_ips_magic_quadrant/  ...Download This Report.
0
 
LVL 18

Author Comment

by:Sanga Collins
ID: 36717547
Thanks guys, your comments have definitely got me going on the right path. i was hoping i could stick with juniper, but more research has led me to the conclusion that it may not be the best device for the job!
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question