The Great IDS Debate
Intrusion detection systems (IDS) have rapidly become a crucial component of any network defense strategy. Over the past few years, their popularity has soared as vendors have refined their results and increased performance capabilities. At the heart of intrusion detection systems lies the analysis engine. It reviews each packet, determines if it is malicious, and logs an alert if necessary – the core tasks of an IDS. Two different IDS techniques, each favored by separate and loyal camps, have emerged as the preferred engine behind the software. Despite the copious marketing material and fiery online debates, each method has distinct strengths and weaknesses. In this article, we'll examine and compare the two different techniques: signature analysis and protocol analysis.
Thursday, February 06, 2003
Tuesday, February 04, 2003
LogAnalysis.Org
This is the new loganalysis.org! We're dedicated to pulling together a repository of useful information on log analysis for computer security.
Log Analysis is one of the great overlooked aspects of operational computer security. Many organizations spend hundreds of thousands of dollars on intrusion detection systems (IDS) deployments - but still ignore their firewall logs. Why? Because the tools and knowledge are often not there, or the tools that exist are too inconvenient. You should expect that to change. Right now, IDS vendors are up against the wall with the volumes of data they produce; the next wave in security is to try to usefully correlate and process the contents of multiple logs.
This is the new loganalysis.org! We're dedicated to pulling together a repository of useful information on log analysis for computer security.
Log Analysis is one of the great overlooked aspects of operational computer security. Many organizations spend hundreds of thousands of dollars on intrusion detection systems (IDS) deployments - but still ignore their firewall logs. Why? Because the tools and knowledge are often not there, or the tools that exist are too inconvenient. You should expect that to change. Right now, IDS vendors are up against the wall with the volumes of data they produce; the next wave in security is to try to usefully correlate and process the contents of multiple logs.
Monday, February 03, 2003
Macintosh Security Site
This site is devoted to the security of your Macintosh computer and the programs or servers you run on it. SecureMac started in February of 1999. Over the past years we have served thousands of people, helping them secure their networks and detect hackers.
On this site you will learn how to secure your Macintosh, detect any hackers present on it, while viewing the most reliable source of security related products, with extensive reviews and ratings evaluated by the top Macintosh security experts. We feel that to create a secure product, the product must be tested, explored, and look at thoroughly. Every product on SecureMac.com is evaluated to its fullest, from secure programming, concept and design. Every product is given a rating and explained in details, each developer or developing group is notified of any security issues or advisories before released to the public to ensure a safe transition for all of their users.
This site is devoted to the security of your Macintosh computer and the programs or servers you run on it. SecureMac started in February of 1999. Over the past years we have served thousands of people, helping them secure their networks and detect hackers.
On this site you will learn how to secure your Macintosh, detect any hackers present on it, while viewing the most reliable source of security related products, with extensive reviews and ratings evaluated by the top Macintosh security experts. We feel that to create a secure product, the product must be tested, explored, and look at thoroughly. Every product on SecureMac.com is evaluated to its fullest, from secure programming, concept and design. Every product is given a rating and explained in details, each developer or developing group is notified of any security issues or advisories before released to the public to ensure a safe transition for all of their users.
i-Catcher
i-Catcher is an innovative PC-Video integration package with sophisticated motion detection and alerting features. Originally devised as a security/surveillance product, i-Catcher is as successful in capturing wildlife images as it is in identifying intruders in your home or business.
In its simplest form i-Catcher is a single application that detects motion in a camera feed, then captures the images and posts them to a web site (look at these examples), or sends them via email (there is also an option for SMS alerting). The i-Catcher Wildlife and Sentry applications can also be connected to i-Catcher Console to provide network-wide monitoring of up to 255 cameras.
i-Catcher is an innovative PC-Video integration package with sophisticated motion detection and alerting features. Originally devised as a security/surveillance product, i-Catcher is as successful in capturing wildlife images as it is in identifying intruders in your home or business.
In its simplest form i-Catcher is a single application that detects motion in a camera feed, then captures the images and posts them to a web site (look at these examples), or sends them via email (there is also an option for SMS alerting). The i-Catcher Wildlife and Sentry applications can also be connected to i-Catcher Console to provide network-wide monitoring of up to 255 cameras.
Sunday, February 02, 2003
Subscribe to:
Posts (Atom)