Solved

IDS device recommendations

Posted on 2011-09-24
3
406 Views
Last Modified: 2013-11-29
Hi EE,

My company is looking to purchase an IDS device to protect our publicly accessible web servers. We are mostly a juniper outfit so i have looked at some of the juniper IDS devices available, but i would like to know what else you recommend. Since this is a new direction we are open to exploring alternatives.
0
Comment
Question by:Sanga Collins
3 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 125 total points
ID: 36592888
Tippingpoint is a good choice.
There is also Cisco IDS, but i would not recommend it.
I have personally worked with RealSecure ISS, now IBM. Its pretty good with a good interface to manage it.
IDP module from juniper too is not up to the mark.
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 125 total points
ID: 36594570
Search at google "magic quadrant for network intrusion preventation system application"
http://www.stonesoft.com/en/campaigns/gartner_ips_magic_quadrant/  ...Download This Report.
0
 
LVL 18

Author Comment

by:Sanga Collins
ID: 36717547
Thanks guys, your comments have definitely got me going on the right path. i was hoping i could stick with juniper, but more research has led me to the conclusion that it may not be the best device for the job!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question