Intrusion Detection In-Depth: Maximizing ROI for IPS/IDS

If you are looking for some exceptional computer security webinars, by leading experts, look no farther than Core Security. They have an extensive library of pre-recorded webcasts and also have live seminars.

If you are new to Intrusion Detection and Prevention Systems, Mike Poor (SANS Instructor) has an excellent webinar called “Intrusion Detection In-Depth: Maximizing ROI for IPS/IDS and Other Defenses“.

The material Mike presents is pulled from his SANS “Intrusion Detection In-Depth” course. The seminar answers many questions including why IDS systems are needed, where to put them, and how to test them.

IDS systems are not going away any time soon and as Mike explains, they are needed now more than ever. Also, Mike discusses his prefered method of focusing the majority of your time and attention to IDS systems that protect your critical assets instead of perimeter IDS systems.

Mike’s reasoning is that perimeter IDS systems, though needed for forensic evidence and required in some businesses, produce mounds of data that can tie up critical analyst resources. The analyst time is much better spent by focusing on the IDS systems that protect critical assets.

He likens this security approach to the Tower of London. It is a fortress that has gates, walls, and armed guards. But like most websites, they allow access to 99.9% of the visitors. The majority of the security though is protecting the Crown Jewels. You can see them, but they are protected by some of the best security in the world.   

Mike’s process for selecting an IDS, pre-testing, monitoring and auditing are covered and well worth the time. He is a very good instructor and is easy to understand. The information is pertinent to the IT tech learning IDS protection, and also to small & large businesses looking to install IDS systems. Check it out! 

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.