Intrusion-detection systems can disable attackers before they do damage - Network ICE does it best. We compare it with three other products; see why we give it our highest marks.
Getting the drop on network intruders
Your network is your kingdom, and you're the leader of the security force. What are you doing to protect your territory? Firewalls help police the perimeter, but they may not be enough. Luckily, there's some pretty advanced technology available for detecting enemies trying to make unauthorized incursions into your home base.
Use our interactive tool to find the product that's right for you. Compare any of 11 products in a variety of categories - and look up detailed vendor specs for each of them (or download a spreadsheet with all the data).
User study: Flight Jacket for NFR follows hackers' travels
When it comes to intrusion detection, most network executives are interested in recognizing an attack and fixing the vulnerability so it can't happen again. But Paul Howell is focused on responding to a hack as it's occurring and catching the intruder in the act.
Download evaluation copies of several products.
Discuss intrusion detection and network security.