Commercial view of Intrusion Detection and Intrusion Prevention Systems. Focus on industrial-strength hardware appliances and software solutions related to IDS/IPS.
Blue Lance LT Auditor+
LT Auditor+ enables administrators to track network activity and alerts users about intrusions through email or paging.
Network monitoring tool recognizes the activity patterns of infected computers. Available for Unix (including Linux and OS X) and Windows XP, and as a standalone LiveCD.
Cisco: Intrusion Prevention System
Network and host based IPS systems designed to detect, classify and stop threats. Includes technical information on solution components and support pages.
Provisioner of IT security products with a focus on active protection of corporate infrastructures. Products include 1U, 2U and 4U rack-mountable intrusion detection/prevention systems.
Software publisher specializing in the development and implementation of network security solutions, including the Centrax Intrusion Detection System.
Network security products for deployment immediately outside the perimeter. Product suite integrates firewall, intrusion prevention, secure content management, and forensics reporting.
DigiStamp: e-TimeStamp Secure Time Stamps
Commercial time-stamping service that provides intellectual property witnessing and document authentication for any file on a system. Service intends to provide digital evidence that data has not been altered or backdated. Recognizes IETF Standard RFC-3161 (Time Stamp Authority).
Providing "Counteract" a network access control (NAC) and intrusion prevention appliance that verifies whether devices on the network have up to date security patches and are free from malware/unauthorised software.
A multi-layered security system designed to protect mission-critical control systems and assist compliance with industry regulations. Incorporates NIDS, HIDS, perimeter security, virus protection, performance monitoring, and secure remote access.
Comprehensive enterprise security monitoring that will detect and respond to attacks in real-time.
The maker of SecureNet Pro, a commercial Network Intrusion Detection (NIDS) product suite.
Provides Verisys file integrity monitoring software for increased security and compliance.
ipANGEL Adaptive IDS/IPS
ipANGEL integrates vulnerability assessment and intrusion detection/prevention technologies, creating a new type of solution that is aware of its environment, and modifies the security posture accordingly.
Vendor of "Security Detective" suite, an application that helps auditors and system administrators protect critical information assets by quickly identifying potential security exposures. Investigate Windows NT, UNIX, OS/400 and VMS security from one central PC.
KeyFocus - KF Sensor - Honey pot IDS
KFSensor is a host based Intrusion Detection System (IDS). It acts as a honey pot to attract and detect hackers by simulating vulnerable system services and trojans.
Lan-Secure Network Security
Vendor of "Security Center" a scan monitor software for real-time intrusion detection and prevention for Microsoft Windows XP and Server 2003.
Features a dynamic threat management system that monitors security breaches and internal misuse without relying on attack signatures.
Intrusion detection, content filtering, security scanner, Internet access control, network security, Internet monitoring.
Macintosh security Auditing suite.
Mirage Networks - Network Access Control
Complete control over the endpoint devices on your network, combining agentless Network Access Control (NAC) with day-zero threat prevention and automated policy enforcement.
Offers multiplatform security secure, detect, and audit. (AS/400, Unix, Linux and Windows NT/2000)
Network monitoring tool that helps identify inappropriate use of network resources using live traffic analysis or output from other IDS systems.
Real-time network sensor-based Intrusion Detection System (IDS). Based on snort, features include live signature updates and custom signature creation.
Information security specialists providing penetration testing, vulnerability assessment, application security audit and intrusion detection implementation services
Extends the capabilities of conventional security systems to help manage threats more efficiently and effectively. Includes a wide array of intrusion detection and analysis tools for Windows servers.
Provider of security scanners, and web analyzers for network maintenance, also consulting and vulnerability testing.
Manufacturer of Network Scout, a behavior-based perimeter intrusion prevention system.
Manufacturer of Intrusion Detection/Prevention appliances. Features include Layer 2 network bridge operation, an integrated hardware/software solution, and automatic attack signature updating.
Sentinel IPS Intrusion Prevention Appliance
Appliance and service that inspects, detects and drops malicious packets so a user's gateway IPs appear unused to intruders.
SPECTER Intrusion Detection System
Official site of the SPECTER intrusion detection system.
REACT is a network abuse monitoring and tracking service which provides real time data to track and control abusive hosts on your network.
Third Brigade Host Intrusion Prevention Systems
Host Intrusion Prevention Systems (HIPS) that stop mass attacks and targeted attacks before they impact hosts, applications and data.
Develops intrusion prevention systems that protect against internal/external attacks and network access control appliances that enforce endpoint compliance policies.
Top Layer Networks
Manufacturer of network IPS (Intrusion Prevention Systems) hardware. ASIC-designed devices help prevent attacks such as distributed denial of service, flood, HTTP URI and SYN attacks for high-traffic networks.
Offers change management and auditing solutions which provide regulatory compliance, network security, and system availability.
Unatek Intrusion Detection and Prevention
Providing information on the corporate intrusion and detection products, services and consulting.
Wireless LAN Monitoring & Intrusion Protection Software
WiMetrics' solutions provide a real-time view of all 802.11 wireless device activity on the wireless LAN. Locate rogue wireless access points without using a wireless sniffer device. Authorize 802.11 devices for trusted network access and automatically block intruders from gaining access to the wired LAN.
Last update:July 7, 2016 at 8:05:10 UTC