technical1
Technical User
Hi,
I was after some general examples of what people used for Intrusion Detection Systems (IDS). Ive been told you shouldnt solely rely upon the PIX firewall for network security.
You should have some form of IDS running monitoring packets for any hacking attempts which the PIX may not pick up.
So what other forms of security do people use, that are effective.
Regards,
Vinay
I was after some general examples of what people used for Intrusion Detection Systems (IDS). Ive been told you shouldnt solely rely upon the PIX firewall for network security.
You should have some form of IDS running monitoring packets for any hacking attempts which the PIX may not pick up.
So what other forms of security do people use, that are effective.
Regards,
Vinay