Wednesday, January 22, 2020

Word of the Day: IDS

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | January 22, 2019
IDS

An intrusion detection system (IDS) is software that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. While anomaly detection and reporting is the primary function, some intrusion detection systems are capable of taking actions when malicious activity or anomalous traffic is detected, including blocking traffic sent from suspicious IP addresses.

An intrusion detection system may be implemented as a software application running on customer hardware, or as a network security appliance. Cloud-based intrusion detection systems are also available to protect data and systems in distributed architectures.

Intrusion detection systems are often confused with intrusion prevention systems. An intrusion prevention system (IPS) also monitors network packets for potentially damaging network traffic, but whereas an intrusion detection system responds to potentially malicious traffic by logging the traffic and issuing warning notifications, an intrusion prevention system responds to such traffic by rejecting the potentially malicious packets. Continue reading...

IDS Vendor Buzz

 

"The latest iteration of Aruba's SD-Branch has an IDS that performs deep packet inspection for malware and suspicious activity. When either is detected, the IDS alerts network managers, while the new intrusion prevention system (IPS) takes immediate action to block threats from spreading to networked devices. -- Antone Gonsalves

IDS Procurement Tips

 

Host IDS vs. network IDS: Which is better?
Compare host IDS vs. network IDS and learn the pros and cons of each.

Which is better: anomaly-based IDS or signature-based IDS?
Learn why IDS vendors are experimenting with both anomaly-based and signature-based features.

2019's top 5 free enterprise network intrusion detection tools
Learn about Snort and 4 other free tools you should consider using for intrusion detection.

Top incident response tools to boost network protection
Learn which Incident response software tools our experts think are best.

Ultimate guide to incident response and management
Learn what role incident detection software systems play in incident response management.

Today's Tech Trivia

 

On this day in history in 1998, the U.S. Department of Justice ruled that computer manufacturers could legally remove the _______ for Internet Explorer.

 

a. desktop shortcut

b. executable file

Click on this link to see the answer!


Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: