Intrusion Detection Software
Intrusion detection systems (IDS) are used to monitor secure networks or systems for any suspicious activity or violations. This is done through either a device or specific software. Once any unwanted activity is detected it is then logged, blocked and reported to an administrator. Currently, there is a wide number of IDS available, these can generally be split into either network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). NIDS are installed only at specific points to monitor inward and outward traffic from the network devices. In comparison, HIDS are installed onto every computer which is part of the network to investigate all traffic from the specific device. IDS can also differ in their detection approach ranging from being signature based to anomaly based. A step beyond these are IDS that can respond to the intrusion once it's detected. The variety of IDS available protects sensitive information from attack and therefore has a use in domestic, commercial, financial and industrial settings. Most companies use some form of it to provide their customers and clients with the confidence that all their data is secure.
-
Borderpoint Continuous Performance Monitoring (1 Supplier)
Request a Quote -
Buried intruder detection systems (1 Supplier)
Request a Quote -
Buried safety detection systems (1 Supplier)
Request a Quote -
CPS Plus Fence Mounted Perimeter Intrusion Detection System (1 Supplier)
Request a Quote -
Fibre optic detection systems (1 Supplier)
Request a Quote -
GPS Plus Buried Perimeter Intrusion Detection System (1 Supplier)
Request a Quote -
Intrusion Detection Software (1 Supplier)
Request a Quote -
IT Managed Services (1 Supplier)
Request a Quote -
PPS Plus Buried Perimeter Intrusion Detection System with Crossing Point Identification (1 Supplier)
Request a Quote -
RFC Plus Buried Perimeter Intrusion Detection System (1 Supplier)
Request a Quote -
Vibration sensitive detection system (1 Supplier)
Request a Quote