Intrusion Detection Software

Intrusion detection systems (IDS) are used to monitor secure networks or systems for any suspicious activity or violations. This is done through either a device or specific software. Once any unwanted activity is detected it is then logged, blocked and reported to an administrator. Currently, there is a wide number of IDS available, these can generally be split into either network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). NIDS are installed only at specific points to monitor inward and outward traffic from the network devices. In comparison, HIDS are installed onto every computer which is part of the network to investigate all traffic from the specific device. IDS can also differ in their detection approach ranging from being signature based to anomaly based. A step beyond these are IDS that can respond to the intrusion once it's detected. The variety of IDS available protects sensitive information from attack and therefore has a use in domestic, commercial, financial and industrial settings. Most companies use some form of it to provide their customers and clients with the confidence that all their data is secure.

Can we help?