Intrusion Detection
When a company connects to the Internet, it opens itself up to worms, viruses and attacks from hackers. To protect your organization from these malicious threats, iiSolutions can deploy firewalls, Intrusion Prevention Systems (IPS), and Intrusion Detection Systems (IDS). The two types of Intrusion Detection Systems include:
- Host-Based IDS reside on each computer in the network. These systems examine event logs, critical system files and other auditable resources looking for suspicious activity. Whenever anything out of the ordinary is noticed, alerts are raised automatically.
- Network-Based IDS reside on and protect the entire network before threats reach their destination and do damage. These monitor all network traffic in real-time, examining packets in order to spot attacks and dangerous payload. When a threat is detected, an alert is raised and the offending connection is immediately terminated.
