Strategic PlanningInformation SecurityTactical SupportAbout UsContact Us


Information Security
Vulnerability Assessment
Intrusion Detection
Continuity Management & Contingency Planning
Disaster Recovery
Secure Data Protection

Intrusion Detection

When a company connects to the Internet, it opens itself up to worms, viruses and attacks from hackers. To protect your organization from these malicious threats, iiSolutions can deploy firewalls, Intrusion Prevention Systems (IPS), and Intrusion Detection Systems (IDS). The two types of Intrusion Detection Systems include:

  • Host-Based IDS reside on each computer in the network. These systems examine event logs, critical system files and other auditable resources looking for suspicious activity. Whenever anything out of the ordinary is noticed, alerts are raised automatically.
  • Network-Based IDS reside on and protect the entire network before threats reach their destination and do damage. These monitor all network traffic in real-time, examining packets in order to spot attacks and dangerous payload. When a threat is detected, an alert is raised and the offending connection is immediately terminated.

Free Checkup
Support
Search

 


 

2011 Internet & Information Solutions, Inc. All rights reserved.