Intrusion Detection10Intrusion Detection Systems (synonymous with Intrusion Prevention Systems, or IPS) are designed to protect networks, endpoints, and companies from more advanced cyberthreats and attacks. The systems aim to repel intruders or, failing that, reduce attacker dwell time and minimize the potential for damage and data loss.AlienVault USM1https://media.trustradius.com/product-logos/LF/Ap/TPOL9A2198T5.JPEGAlienVault OSSIM2https://media.trustradius.com/vendor-logos/Sv/TO/0HHS1EUA42K7-180x180.JPEGAlert Logic Network Threat Detection3https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGJuniper SRX4https://media.trustradius.com/vendor-logos/gB/Ia/1U86W7216QBM-180x180.PNGRackFoundry Total Security Management5https://media.trustradius.com/product-logos/Jl/h8/UUKVPXASSP28.PNGSourcefire 3D6https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGCrowdStrike Falcon Endpoint Protection7https://media.trustradius.com/vendor-logos/QJ/nR/NGAP2XUTKHMV-180x180.JPEGCisco IPS Sensor8https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGTrend Micro TippingPoint Threat Protection System (TPS)9https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGMcAfee Network Security Platform10https://media.trustradius.com/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGTripwire Enterprise11https://media.trustradius.com/product-logos/vQ/0Z/Z47MM8PPWZWH.JPEGPalo Alto Networks URL Filtering PAN-DB12https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGPalo Alto Networks Threat Protection13https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGIBM Security Network Intrusion Prevention System14https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGV-Key15https://media.trustradius.com/product-logos/CJ/WW/4NL81NPBICPW.pngVectra Cognito Platform16https://media.trustradius.com/vendor-logos/MJ/0i/7FEIG3P6ANFK-180x180.JPEGJuniper IDP17https://media.trustradius.com/vendor-logos/gB/Ia/1U86W7216QBM-180x180.PNGFidelis Elevate18https://media.trustradius.com/vendor-logos/Cr/St/CWDVA1VIQBH9-180x180.JPEGDtex19https://media.trustradius.com/vendor-logos/vf/Cs/A9DJ5B09RNMC-180x180.JPEGPalo Alto Networks AutoFocus20https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGMetadefender21https://media.trustradius.com/vendor-logos/WP/9c/TOX816UGPB6K-180x180.PNGLookingGlass Cyber Solutions22https://media.trustradius.com/vendor-logos/vV/Bv/W7ESFB5029BF-180x180.JPEGEndgame23https://media.trustradius.com/vendor-logos/ns/aG/WQ66LX7SWOKP-180x180.PNGProofpoint Advanced Threat Protection24https://media.trustradius.com/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGZiften Zenith25https://media.trustradius.com/vendor-logos/ZX/zo/C3USUF1M29L1-180x180.JPEG

Intrusion Detection Systems

Intrusion Detection SystemsOverview

What are Intrusion Detection Systems?

Intrusion detection systems (IDS) are software products that monitor network or system activities, and analyze them for signs of any violations of policy, acceptable use, or standard security practices. They then report any malicious activities or policy violations to system administrators.

Intrusion detection systems are concerned primarily with identifying potential incidents and logging information about them and notifying administrators of observed events. However some systems, usually called instruction prevention systems, actively try to prevent intrusion threats from succeeding.

Types of Intrusion Detection Software

  • Network-based systems: Network-based systems monitor network traffic for network segments or devices to identify suspicious activity
  • Wireless monitoring: Wireless systems monitor wireless network traffic and analyze it to identify suspicious activity involving wireless networking protocols
  • Network behavior analysis: Network behavior analysis systems monitor network traffic to identify threats generating unusual traffic flows like denial of service attacks, malware or policy violations
  • Host-based systems: Host-based systems monitor the characteristics of a single host and events occurring within that host

Intrusion Detection Products

Listings (1-25 of 44)

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Top Rated
456 Ratings

AlienVault USM Anywhere is a cloud-based security management solution that promises to accelerate and centralize threat detection, incident response, and compliance management for cloud, hybrid cloud, and on-premises environments. The vendor says that USM Anywhere includes purpose-built cloud sen...

15 Ratings

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset dis...

We don't have enough ratings and reviews to provide an overall score.

V-Key from the company of the same name in Redwood City, California, is an intrusion detection / protection system.

We don't have enough ratings and reviews to provide an overall score.

San Jose-based Vectra offers their intruder and cyberthreat detection software, the Cognito Platform, which is designed to detect and remediate intrusion, as well as supply context with incident investigation.

We don't have enough ratings and reviews to provide an overall score.

Juniper IDP, from Juniper Networks is a product line providing security and intrusion detection / prevention.

We don't have enough ratings and reviews to provide an overall score.

Fidelis Cybersecurity offers Elevate, the company's flagship threat prevention and detection platform that encompasses three modules, Fidelis Network Module which provides threat detection and network visibility, Fidelis Deception which is based on technology acquired with TopSpin Security in 201...

We don't have enough ratings and reviews to provide an overall score.

Dtex is a threat detection security product, that uses behavior intelligence to uncover both internal and external threats.

We don't have enough ratings and reviews to provide an overall score.

AutoFocus™ contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

We don't have enough ratings and reviews to provide an overall score.

OPSWAT Metadefender is a vulnerability management security product comprising vulnerability assessment, data cleansing, malware engines, and customized security policies.

We don't have enough ratings and reviews to provide an overall score.

LookingGlass Cyber Solutions is a threat protection solution protecting against cyber attacks to global enterprises and government agencies The product is augmented by a team of security analysts who enrich the data feeds and provide timely insights to customers of potential risks.

We don't have enough ratings and reviews to provide an overall score.

Endgame is an endpoint security platform that unifies prevention, detection, and threat hunting to stop known and unknown attacker behaviors with a single agent.

We don't have enough ratings and reviews to provide an overall score.

Ziften in Austin, Texas offers Zenith, an application dedicated to providing visibility into user application activity across all managed devices for the purpose of intrusion and malicious behavior detection.