Tips to Improve Intrusion Detection

Perimeter Security

Organizations that implement the following recommendations should facilitate more efficient and effective intrusion detection and prevention system use:

  • Organizations should ensure that all intrusion detection and provision system components are secured appropriately because these systems are often targeted by attackers who want to prevent them from detecting attacks or want to gain access to sensitive information in the intrusion detection and prevention system, such as host configurations and known vulnerabilities.
  • Organizations should consider using multiple types of intrusion detection and prevention technologies to achieve more comprehensive and accurate detection and prevention of malicious activity. The four primary types of intrusion detection and prevention technologies - network-based, wireless, network behavior analysis and host-based - each offer fundamentally different information gathering, logging, detection and prevention capabilities.

  • Organizations planning to use multiple types of intrusion detection and prevention technologies or multiple products of the same technology type should consider whether or not the systems should be integrated. Direct intrusion detection and prevention system integration most often occurs when an organization uses multiple products from a single vendor, by having a single console that can be used to manage and monitor the multiple products. Some products can also mutually share data, which can speed the analysis process and help users to better prioritize threats.

  • Before evaluating intrusion detection and prevention products, organizations should define the requirements that the products should meet. Evaluators must understand the characteristics of the organization's system and network environments, so that a compatible intrusion detection and prevention system can be selected that can monitor the events of interest on the systems and/or networks.

  • When evaluating intrusion detection and prevention products, organizations should consider using a combination of several sources of data on the product's' characteristics and capabilities. Common product data sources include test lab or real-world product testing, vendor-provided information, third-party product reviews and previous experience from individuals within the organization and trusted individuals at other organizations.

Source: Bank Info Security

25 Perimeter Security

Perimeter Security.

Perimeter Security, Video Intrusion Detection, Fiber Optic Security System, Marine Security, Marine Net, Under Water Marine Net Detection, Under Water Marine Detection, Under Water Security, Security Under Water, Perimeter Security, Fiber Optic Sensor, Fence Detection, Fiber Optic Net, Airport Security, Nuclear Facilities Security, Nuclear Security, Government Security, Perimeter Security for Federal Government, Fiber Optic for Perimeter Security, Perimeter Security for Oil and Gas, Perimeter Security for Water Utilities, Perimeter Security for Treatment Plants, Perimeter Security for Storage Tanks, Perimeter Security for Dams, Perimeter Security for Reservoirs, Perimeter Security for Electric Utilities, Perimeter Security for Generation Plants, Perimeter Security for Sub-Stations, Perimeter Security for Switchyards, Perimeter Security for Chemical Facilities, Perimeter Security for Chemical Plants, Perimeter Security for Refineries, Perimeter Security for LNG Plants,Perimeter Security for Storage Facilities, Perimeter Security for Transportation Industry, Perimeter Security for Airports, Perimeter Security for Seaports, Perimeter Security for Roads and Railroads, Perimeter Security for High Security Sites, Perimeter Security for Government Facilities, Perimeter Security for Nuclear Plants, Perimeter Security for Military Bases, Perimeter Security for Prisons, Perimeter Security for Oil and Gas, Perimeter Security for Oil Fields, Perimeter Security for Storage Facilities, Perimeter Security for Refineries.