Commercial view of Intrusion Detection and Intrusion Prevention Systems. Focus on industrial-strength hardware appliances and software solutions related to IDS/IPS.
Subcategories 1
Sites 37
Loading new listings for you to review...
- Intrusion, Inc. The maker of SecureNet Pro, a commercial Network Intrusion Detection (NIDS) product suite.
- Top Layer Networks Manufacturer of network IPS (Intrusion Prevention Systems) hardware. ASIC-designed devices help prevent attacks such as distributed denial of service, flood, HTTP URI and SYN attacks for high-traffic networks.
- Third Brigade Host Intrusion Prevention Systems Host Intrusion Prevention Systems (HIPS) that stop mass attacks and targeted attacks before they impact hosts, applications and data.
- KeyFocus - KF Sensor - Honey pot IDS KFSensor is a host based Intrusion Detection System (IDS). It acts as a honey pot to attract and detect hackers by simulating vulnerable system services and trojans.
- Paldion Networks Information security specialists providing penetration testing, vulnerability assessment, application security audit and intrusion detection implementation services
- Sentinel IPS Intrusion Prevention Appliance Appliance and service that inspects, detects and drops malicious packets so a user's gateway IPs appear unused to intruders.
- CyberSafe Software publisher specializing in the development and implementation of network security solutions, including the Centrax Intrusion Detection System.
- Blue Lance LT Auditor+ LT Auditor+ enables administrators to track network activity and alerts users about intrusions through email or paging.
- Tripwire, Inc Offers change management and auditing solutions which provide regulatory compliance, network security, and system availability.
- SPECTER Intrusion Detection System Official site of the SPECTER intrusion detection system.
- MacAnalysis Macintosh security Auditing suite.
- Neogenesys Offers multiplatform security secure, detect, and audit. (AS/400, Unix, Linux and Windows NT/2000)
- LANguard Intrusion detection, content filtering, security scanner, Internet access control, network security, Internet monitoring.
- Intruder Alert Comprehensive enterprise security monitoring that will detect and respond to attacks in real-time.
- Lancope Features a dynamic threat management system that monitors security breaches and internal misuse without relying on attack signatures.
- TippingPoint Technologies Develops intrusion prevention systems that protect against internal/external attacks and network access control appliances that enforce endpoint compliance policies.
- Wireless LAN Monitoring & Intrusion Protection Software WiMetrics' solutions provide a real-time view of all 802.11 wireless device activity on the wireless LAN. Locate rogue wireless access points without using a wireless sniffer device. Authorize 802.11 devices for trusted network access and automatically block intruders from gaining access to the wired LAN.
- Safety-Lab Provider of security scanners, and web analyzers for network maintenance, also consulting and vulnerability testing.
- PacketAlarm Real-time network sensor-based Intrusion Detection System (IDS). Based on snort, features include live signature updates and custom signature creation.
- SecurityMetrics Manufacturer of Intrusion Detection/Prevention appliances. Features include Layer 2 network bridge operation, an integrated hardware/software solution, and automatic attack signature updating.
- Countersnipe Provisioner of IT security products with a focus on active protection of corporate infrastructures. Products include 1U, 2U and 4U rack-mountable intrusion detection/prevention systems.
- Joret Software Vendor of "Security Detective" suite, an application that helps auditors and system administrators protect critical information assets by quickly identifying potential security exposures. Investigate Windows NT, UNIX, OS/400 and VMS security from one central PC.
- DigiStamp: e-TimeStamp Secure Time Stamps Commercial time-stamping service that provides intellectual property witnessing and document authentication for any file on a system. Service intends to provide digital evidence that data has not been altered or backdated. Recognizes IETF Standard RFC-3161 (Time Stamp Authority).
- ipANGEL Adaptive IDS/IPS ipANGEL integrates vulnerability assessment and intrusion detection/prevention technologies, creating a new type of solution that is aware of its environment, and modifies the security posture accordingly.
- SECUREDwire Manufacturer of Network Scout, a behavior-based perimeter intrusion prevention system.
- Ionx Provides Verisys file integrity monitoring software for increased security and compliance.
- Lan-Secure Network Security Vendor of "Security Center" a scan monitor software for real-time intrusion detection and prevention for Microsoft Windows XP and Server 2003.
- ForeScout Technologies Providing "Counteract" a network access control (NAC) and intrusion prevention appliance that verifies whether devices on the network have up to date security patches and are free from malware/unauthorised software.
- Deepnines Technologies Network security products for deployment immediately outside the perimeter. Product suite integrates firewall, intrusion prevention, secure content management, and forensics reporting.
- NetWitness Network monitoring tool that helps identify inappropriate use of network resources using live traffic analysis or output from other IDS systems.
- Privacyware Extends the capabilities of conventional security systems to help manage threats more efficiently and effectively. Includes a wide array of intrusion detection and analysis tools for Windows servers.
- Unatek Intrusion Detection and Prevention Providing information on the corporate intrusion and detection products, services and consulting.
- Mirage Networks - Network Access Control Complete control over the endpoint devices on your network, combining agentless Network Access Control (NAC) with day-zero threat prevention and automated policy enforcement.
- Support Intelligence REACT is a network abuse monitoring and tracking service which provides real time data to track and control abusive hosts on your network.
- Cisco: Intrusion Prevention System Network and host based IPS systems designed to detect, classify and stop threats. Includes technical information on solution components and support pages.
- BotHunter Network monitoring tool recognizes the activity patterns of infected computers. Available for Unix (including Linux and OS X) and Windows XP, and as a standalone LiveCD.
- Industrial Defender A multi-layered security system designed to protect mission-critical control systems and assist compliance with industry regulations. Incorporates NIDS, HIDS, perimeter security, virus protection, performance monitoring, and secure remote access.