Define: Intrusion detection system?
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system combines outputs from multiple sources and uses alarm filtering techniques to distinguish malicious activity from false alarms.
Top Intrusion Prevention System (IPS) Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Intrusion Prevention System (IPS) solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
The Future of Cloud WiFi At Mojo Networks, we are leading a revolution in cloud managed WiFi services and products for enterprise wireless. Existing architectures are antiquated.
Controllers will soon be obsolete. We make it simple to move your massive enterprise WLAN to the cloud with automation and built-in scaling.
Mojo’s cloud WiFi platform is easy to deploy and intuitive to manage while also enabling advanced features like graphical troubleshooting, WiFi user analytics and social engagement. Above all, we continue to advance our widely acknowledged industry-leading security capabilities.
We’ve secured the air and built our cloud designed for a new frontier of prolific connectivity. Prolific – We want seamless connectivity for everyone, everywhere, all the time.
Manage your Mojo Networks WiFi products from anywhere in the world – no controllers required. Intuitive – Our access points and sensors are programmed out-of-the-box to automatically discover and connect to the Mojo Networks cloud wireless platform.
Deployment and management is a piece of cake. Responsive – Most of the time the Mojo Networks cloud managed WiFi platform works like magic, but when it doesn’t, we respond immediately to do what’s right for our customers.
Sourcefire, Inc. provides enterprise threat management solutions for information technology (IT) infrastructures of healthcare, financial services, manufacturing, energy, education, retail, telecommunications, and federal and state government organizations in the United States and internationally.
It manufactures various open source and commercial security products. The company’s products include Snort, an open source intrusion prevention technology that is incorporated into the intrusion prevention system software component of the Sourcefire 3D System (Discover, Determine, Defend).
The Sourcefire 3D System comprises multiple Sourcefire hardware and software product offerings, which provide an intelligent network defense that unifies intrusion prevention system, network behavior analysis, network access control, and vulnerability assessment solutions under a common management framework. Sourcefire also offers ClamAV, an open source gateway anti-virus and anti-malware project.
In addition, the company offers technical support and professional services, including network security deployment, customer support, and education and certification services. Sourcefire markets and sells its appliances, software, and services through its direct sales organization and indirectly through the resellers, distributors, and original equipment manufacturers.
The company was founded in 2001 and is headquartered in Columbia, Maryland.. .
Established in 1995, Bkav Corporation is the leading firm in network security, software, smartphone manufacturing and smarthome. In the field of network security, antivirus and mobile security softwares of Bkav have been present in more than 100 countries all over the world.
The corporation has preeminent security experts. Bkav is known as the security firm to discover the first critical flaw in Google Chrome just days after its launch in 2008.
Bkav was also the firm to trace the master server in Britain of unprecedentedly massive DDoS attacks targeting US and Korean governments’ websites in July, 2009. Bkav Corporation is known as a manufacturer of security appliances such as intrusion prevention system Bkav Network Inspector, Bkav Antispam GW, Bkav WebSecurity Scan.
Bkav is also providing collaboration software products (messenger, workflow management, mail, video conference). In electronics industry, Bkav is a smartphone and smarthome manufacturer.
With Bkav SmartHome, every equipment in your house will be connected and controlled automatically based on smart context scenarios via touch screen or tablet, hence creating a convenient, safe and energy-saving living environment.. .
Founded in 1997, Santa Clara, CA-based Sanctum, Inc. is recognized by IDC as the de facto leader in Web application security.
Sanctum’s solutions help organizations create reliable “hacker resistant” applications in the development environment, assure quality in the QA environment, and maintain confidence in the live production environment. Sanctum’s solutions include AppShield, an automated Intrusion Prevention system, and an automated application risk assessment and security testing tool called AppScan.
Together they provide the most comprehensive policy based security available today to stop any unanticipated application level attack and maintain the application behavior as originally intended by the developer. Today, with solutions from Sanctum, the enterprise is assured quality, compliance and security across the application lifecycle with the online and offline solutions that will help you develop with quality, test for compliance and operate with confidence in your online world..
Deep Nines. provides integrated security solutions designed to control Internet threats.
It offers Edge Security Profiler, a network monitoring and analysis tool; Security Edge System, an intrusion prevention system; and Security Edge Platform, an integrated and unified threat management system that integrates security functionality into a single solution. The company also provides iTrust, a content filtering system that allows administrators to permit and prioritize good Internet traffic, block bad online content, and eliminate content filter circumventions; Infection Free Networking, a network access control solution; and Internet Content Audit, an assessment that determines the extent of unwanted traffic on network.
It serves financial services, healthcare, energy, and government sectors, as well as service providers, higher education and K-12 education institutions, small to medium businesses, and enterprises. The company was founded in 1999 and is headquartered in Dallas, Texas..
Based in Dallas, Texas, Sentinel IPS began life as EcoNet.com, a web development firm founded at the dawn of the World Wide Web in 1995. By the early 2000s, they’d become successful resellers of various network security products, and began to develop their first Intrusion Prevention System.
Since 2004, they’ve continued to expand their products’ functionality and visibility, installing Sentinel units all over the world with Fortune 100 firms, government and municipal agencies, financial institutions, and a diverse list of small businesses. Our current IPS/IDS solution – Sentinel 4 – was initially released in 2012, and continues to evolve rapidly through innovative new features, software updates, and hardware upgrades..
VoIPshield Systems develops products to protect Voice-over-IP (VoIP) networks from security threats and exploits. The company’s key products include VoIPaudit, a VoIP Vulnerability Assessment (VVA) System, and VoIPguard, a VoIP Intrusion Prevention System (VIPS).
VoIPshield Labs, the internal research group, performs vulnerability testing and analysis specialized in zero-day vulnerabilities.. .
SoftSphere Technologies is a strong anti-malware sandbox intrusion prevention system and personal firewall. DefenseWall Personal Firewall – the world’s first sandboxing-style personal firewall solution – No learning modes (as seen with firewall and HIPS programs).
– Mininimal popups. – Compatible with third-party security software and programs.
– No need to configure ports and sockets. – No application checksum re-calculations.
Average users find it difficult to setup and use your typical firewall and security program. For most average users, program popups and questions are confusing.
There is always the chance a user will make the wrong choice and allow malware to cause damage to their system. DefenseWall Personal Firewall is a different kind of security program.
You won’t even notice it’s installed and providing the highest firewall and system protection. DefenseWall Personal Firewall is based on a sandboxing approach that uses rights restrictions and partial virtualization.
GentleSecurity was founded to bridge strong computer security with usability. While working on various security products, they have realized the gap in the present state of computer security.
On one side, there are relatively easy-to-use approaches dealing with attack signature or behavior detection, which do not provide an assured level of security. On another side, more secure but over-complicated protection requiring strong passwords, firewall rules, access control lists etc.
The first, miss security threats, the second are too complicated to be usable. To bridge the gap GentleSecurity has invented GeSWall technology that prevents damage from targeted attacks and malicious software, non-intrusive, require no or minimal administration and scalable from individual windows computer up to entire enterprise network.
They provide solutions for both customers and enterprises. GeSWall is intrusion prevention system that is non-intrusive and easy to use.
With GeSWall, you can safely surf the web, use e-mail, chat, exchange files etc, regardless of the security threats posed by the Internet. GeSWall is a required supplementary to your anti-virus, anti-spyware and personal firewall as it blocks unknown threats missed by those solutions.
Anti-virus, anti-spyware and personal firewall are particularly good to find and remove known viruses, trojuns and spy-ware. However they fail in front of unknown mal-ware, targeted intrusions and zero-day attacks.
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.