Solved

Anybody has a review of ESentire as an IDS solution ? How do they rate in the real world ?

Posted on 2016-07-25
1
366 Views
Last Modified: 2016-07-31
We are considering deploying them as a solution and I was wondering of anyone has them or has experience with them .
0
Comment
Question by:Andre P
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 41736720
I've never heard of them, but that doesn't mean they aren't any good. Most IDS systems use SNORT as their backend and sell their own sigs and a front-end. We used to use Snort (now SourceFire/Talos), but the detection engine is in the stone-ages. We use Suricata now, a much more modern and capable IDS that is still FOSS.
Here is Gartner's 2015 magic quadrant on IPS systems (most IDS's can be used in IPS mode)
https://securityintelligence.com/wp-content/uploads/2015/12/Gartner-MQ-IPS-2015-11-16.jpg

ESentire however looks like a HIPS, which is much different than traditional IDS. ESentire would be more like Bromium, Invinvea, Carbon Black, Bit-9, Cylance. HIPS is the old name for "next generation" endpoint protection.
-rich
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question