Solved

Anybody has a review of ESentire as an IDS solution ? How do they rate in the real world ?

Posted on 2016-07-25
1
326 Views
Last Modified: 2016-07-31
We are considering deploying them as a solution and I was wondering of anyone has them or has experience with them .
0
Comment
Question by:Andre P
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 41736720
I've never heard of them, but that doesn't mean they aren't any good. Most IDS systems use SNORT as their backend and sell their own sigs and a front-end. We used to use Snort (now SourceFire/Talos), but the detection engine is in the stone-ages. We use Suricata now, a much more modern and capable IDS that is still FOSS.
Here is Gartner's 2015 magic quadrant on IPS systems (most IDS's can be used in IPS mode)
https://securityintelligence.com/wp-content/uploads/2015/12/Gartner-MQ-IPS-2015-11-16.jpg

ESentire however looks like a HIPS, which is much different than traditional IDS. ESentire would be more like Bromium, Invinvea, Carbon Black, Bit-9, Cylance. HIPS is the old name for "next generation" endpoint protection.
-rich
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SSH setup on ASA 5505 17 120
hsrp tracking 2 60
Protecting Server 2003 against Ransomware 2 77
Run powershell against OU 7 75
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question