Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > AlienVault > IDS Evaluation Guide

IDS Evaluation Guide

White Paper Published By: AlienVault
Published:  Mar 30, 2016
Type:  White Paper

An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach.

In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements.

Topics covered to help you evaluate IDS solutions include:

  • An overview of network and host-based IDS
  • Signature-based vs. anomaly-based systems
  • Throughput of IDS solutions
  • Protocol analysis
  • Aggregation capabilities
  • Integration capabilities
  • Contextual enhancement

Download your version now to learn what capabilities you should consider when evaluating IDS solutions.

Tags :