Summary


In this chapter, we have covered IDS evaluation criteria that are vital to information-security professionals in the process of choosing the right tool for their specific environment. In no case should you rely solely on the information provided by the vendor. Like anyone else in sales, their first concern is selling the product, and their being more interested in seeing the client find a solution that adequately fits their aims and purposes than in piling up higher sales numbers is rare. Hopefully, the evaluation criteria described in this chapter and the recommendations provided here will enable specialists to make the right choice from among the tools covered here, as well as those that go beyond the range of tools discussed in this book.




Protect Your Information with Intrusion Detection
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net