Intrusion Detection10Intrusion Detection Systems (synonymous with Intrusion Prevention Systems, or IPS) are designed to protect networks, endpoints, and companies from more advanced cyberthreats and attacks. The systems aim to repel intruders or, failing that, reduce attacker dwell time and minimize the potential for damage and data loss.AlienVault USM1https://dudodiprj2sv7.cloudfront.net/product-logos/6i/pV/S7QULUJUMN0O.JPEGJuniper SRX2https://dudodiprj2sv7.cloudfront.net/vendor-logos/gB/Ia/1U86W7216QBM-180x180.PNGRackFoundry Total Security Management3https://dudodiprj2sv7.cloudfront.net/product-logos/Jl/h8/UUKVPXASSP28.PNGCrowdStrike Falcon Endpoint Protection4https://dudodiprj2sv7.cloudfront.net/vendor-logos/QJ/nR/NGAP2XUTKHMV-180x180.JPEGAlienVault OSSIM5https://dudodiprj2sv7.cloudfront.net/vendor-logos/Gr/1i/U8I0UCHEN0SA-180x180.JPEGSourcefire 3D6https://dudodiprj2sv7.cloudfront.net/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGTippingPoint IPS7https://dudodiprj2sv7.cloudfront.net/vendor-logos/jO/Qr/06NTU61NMFS5.pngMcAfee Network Security Platform8https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGTripwire Enterprise9https://dudodiprj2sv7.cloudfront.net/product-logos/vQ/0Z/Z47MM8PPWZWH.JPEGPalo Alto Networks URL Filtering PAN-DB10https://dudodiprj2sv7.cloudfront.net/vendor-logos/gL/oy/XPS2EOZXNW82.jpegPalo Alto Networks Threat Protection11https://dudodiprj2sv7.cloudfront.net/vendor-logos/gL/oy/XPS2EOZXNW82.jpegCisco IPS Sensor12https://dudodiprj2sv7.cloudfront.net/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGIBM Security Network Intrusion Prevention System13https://dudodiprj2sv7.cloudfront.net/vendor-logos/pB/Jj/SEO8QKLQWG7P-180x180.JPEGV-Key14https://dudodiprj2sv7.cloudfront.net/product-logos/CJ/WW/4NL81NPBICPW.pngJuniper IDP15https://dudodiprj2sv7.cloudfront.net/vendor-logos/gB/Ia/1U86W7216QBM-180x180.PNGFidelis Elevate16Alert Logic Network Threat Detection17https://dudodiprj2sv7.cloudfront.net/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGDtex18https://dudodiprj2sv7.cloudfront.net/vendor-logos/vf/Cs/A9DJ5B09RNMC-180x180.JPEGPalo Alto Networks AutoFocus19https://dudodiprj2sv7.cloudfront.net/vendor-logos/gL/oy/XPS2EOZXNW82.jpegOPSWAT Metadefender20https://dudodiprj2sv7.cloudfront.net/vendor-logos/WP/9c/TOX816UGPB6K-180x180.PNGLookingGlass Cyber Solutions21https://dudodiprj2sv7.cloudfront.net/vendor-logos/vV/Bv/W7ESFB5029BF-180x180.JPEGEndgame22https://dudodiprj2sv7.cloudfront.net/vendor-logos/ns/aG/WQ66LX7SWOKP-180x180.PNGProofpoint Advanced Threat Protection23Ziften Zenith24https://dudodiprj2sv7.cloudfront.net/vendor-logos/ZX/zo/C3USUF1M29L1-180x180.JPEGAT&T Threat Intellect25https://dudodiprj2sv7.cloudfront.net/vendor-logos/10/5S/3XFHATD0DGJ5-180x180.PNG

Intrusion Detection Systems

Intrusion Detection SystemsOverview

What are Intrusion Detection Systems?

Intrusion detection systems (IDS) are software products that monitor network or system activities, and analyze them for signs of any violations of policy, acceptable use, or standard security practices. They then report any malicious activities or policy violations to system administrators.

Intrusion detection systems are concerned primarily with identifying potential incidents and logging information about them and notifying administrators of observed events. However some systems, usually called instruction prevention systems, actively try to prevent intrusion threats from succeeding.

Types of Intrusion Detection Software

  • Network-based systems: Network-based systems monitor network traffic for network segments or devices to identify suspicious activity
  • Wireless monitoring: Wireless systems monitor wireless network traffic and analyze it to identify suspicious activity involving wireless networking protocols
  • Network behavior analysis: Network behavior analysis systems monitor network traffic to identify threats generating unusual traffic flows like denial of service attacks, malware or policy violations
  • Host-based systems: Host-based systems monitor the characteristics of a single host and events occurring within that host

Intrusion Detection Products

Listings (1-25 of 30)

AlienVault USM

316 Ratings

Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat...

Juniper SRX

13 Ratings

Juniper SRX is product-line of firewall technology and intrusion detection / prevention systems from Juniper Networks in California.

RackFoundry Total Security Management

5 Ratings

RackFoundry Total Security Management offers a complete solution featuring powerful firewall, VPN, Intrusion Detection/Prevention, SIEM, automated vulnerability scanning and log management that is monitored by the vendor’s security operations center. According to the vendor, it is the first...

CrowdStrike Falcon Endpoint Protection

3 Ratings

CrowdStrike's Falcon line of software includes Falcon Endpoint Protection, a complete antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating.

AlienVault OSSIM

12 Ratings

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset...

Sourcefire 3D

2 Ratings

Sourcefire 3D is an intrusion detection and prevention system, from Cisco.

TippingPoint IPS

5 Ratings

TippingPoint IPS from Trend Micro is an intrusion detection and prevention system acquired from Hewlett Packard Enteprise (HPE).

McAfee Network Security Platform

5 Ratings

McAfee Network Security Platform is an intrusion detection and prevention system (IDPS).

Tripwire Enterprise

4 Ratings

Tripwire Enterprise, from Tripwire in Portland, Oregon, is an intrusion detection/prevention system.

Palo Alto Networks URL Filtering PAN-DB

3 Ratings

The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack...

Palo Alto Networks Threat Protection

4 Ratings

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all...

Cisco IPS Sensor

We don't have enough ratings and reviews to provide an overall score.

Cisco IPS Sensor is, as the name would suggest, an intrusion prevention system from Cisco.

IBM Security Network Intrusion Prevention System

We don't have enough ratings and reviews to provide an overall score.

IBM Security Network IPS is an intrusion detection and prevention system.

V-Key

We don't have enough ratings and reviews to provide an overall score.

V-Key from the company of the same name in Redwood City, California, is an intrusion detection / protection system.

Juniper IDP

We don't have enough ratings and reviews to provide an overall score.

Juniper IDP, from Juniper Networks is a product line providing security and intrusion detection / prevention.

Fidelis Elevate

We don't have enough ratings and reviews to provide an overall score.

Fidelis Cybersecurity offers Elevate, the company's flagship threat prevention and detection platform that encompasses three modules, Fidelis Network Module which provides threat detection and network visibility, Fidelis Deception which is based on technology acquired with TopSpin Security in 2017...

Dtex

We don't have enough ratings and reviews to provide an overall score.

Dtex is a threat detection security product, that uses behavior intelligence to uncover both internal and external threats.

Palo Alto Networks AutoFocus

We don't have enough ratings and reviews to provide an overall score.

AutoFocus™ contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

OPSWAT Metadefender

We don't have enough ratings and reviews to provide an overall score.

OPSWAT Metadefender is a vulnerability management security product comprising vulnerability assessment, data cleansing, malware engines, and customized security policies.

LookingGlass Cyber Solutions

We don't have enough ratings and reviews to provide an overall score.

LookingGlass Cyber Solutions is a threat protection solution protecting against cyber attacks to global enterprises and government agencies The product is augmented by a team of security analysts who enrich the data feeds and provide timely insights to customers of potential risks.

Endgame

We don't have enough ratings and reviews to provide an overall score.

Endgame is an endpoint security platform that unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors with a single agent.

Proofpoint Advanced Threat Protection

We don't have enough ratings and reviews to provide an overall score.

Proofpoint Advanced Threat Detection is a suite of threat detection products including Attack Protection for Email, SaaS applications, Mobile Defense, Threat Response, and Threat Intelligence.

Ziften Zenith

We don't have enough ratings and reviews to provide an overall score.

Ziften in Austin, Texas offers Zenith, an application dedicated to providing visibility into user application activity across all managed devices for the purpose of intrusion and malicious behavior detection.

AT&T Threat Intellect

We don't have enough ratings and reviews to provide an overall score.

AT&T offers Threat Intellect, their cybersecurity platform emphasizing advanced threat detection capabilities.