* How will security products evolve? If you are plugged into the security grapevine, you likely know that Gartner caused quite a stir when it issued a report in June stating that intrusion-detection systems will be obsolete by 2005.The research firm’s report predicted that stand-alone network-based IDSs, sometimes called “NIDSs,” will be supplanted by firewalls that combine network-level and application-level filtering to block malicious traffic and specified content. They will also likely perform anti-virus functions.The new category of device is frequently called an intrusion-prevention system (IPS). Often, these devices work directly in the data path, as opposed to IDS/NIDSs, which traditionally monitor copies of traffic offline.On the one hand, we need security products to evolve to thwart new attacks in a just-in-time manner. This summer’s Internet escapades revealed that, if nothing else, anti-virus software alone – while great at blocking known infections – doesn’t do well when a brand-new attack first hits. One estimate, for example, is that the Blaster worm infected 137,000 Internet hosts in just two hours. So these suckers can do a lot of damage in the time it takes to create and circulate a fix. However, is it really necessary to combine functions in one device (in this case, the firewall), as long as you get all the capabilities you need? It would seem that the form factor and strategic placement of these security capabilities in the network should be up to you.One potential worry is that collapsing all your security filtering into a single edge device has single-point-of-failure/attack and congestion ramifications. Also, are you are going to put all your local users outside your firewall? After all, it’s no secret that many breaches are generated internally. If the answer is no, the network segments where you would likely perform filtering include data center hosts (via IPS host software), backbone switches and at the traditional perimeter of the network – the WAN edge and, possibly, the wiring closets where wireless LANs connect to the wired LAN.One of the issues with NIDSs is the volume of false alarms some products generate, making them unwieldy, costly and ineffective. Another controversy is whether newer IPS sensors are more effective when operating directly in the production data path or offline (a.k.a., “promiscuously”), as is the case with most IDS/NIDSs.We’ll examine these issues in future newsletters. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe