Blue Lance LT Auditor+
http://www.bluelance.com
LT Auditor+ enables administrators to track network activity and alerts users to intrusions through e-mail or paging.
Cisco Systems IDS
http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml
The Cisco Secure Intrusion Detection System is an enterprise-scale, real-time system designed to detect, report, and terminate unauthorized activity throughout a network.
CyberCop
http://www.cybercop.co.uk
Intrusion detection and protection systems, including CyberCop Scanner, CyberCop Monitor, CyberCop Sting, and CyberCop CASL.
CyberSafe
http://www.cybersafe.com
CyberSafe is a software publisher specializing in the development and implementation of network security solutions, such as Centrax IDS.
Cyber Trace
http://www.cybertrace.com/ctids.html
A network security management system.
Demrac PureSecure — Total Intrusion Detection System
http://www.demarc.com
Demarc Security offers PureSecure, an all-inclusive network monitoring service that allows users to monitor an entire network of servers from a Web interface; combines NIDS, HIDS and Host/Service monitoring functionality.
eCom Corporation
http://www.e-com.ca/eSCAN
A source for firewall security, intrusion detection systems, network security, network security management, computer network security, network security monitoring, computer security, Web security, e-security, and NT security.
eTrust
http://www.cai.com/solutions/enterprise/etrust/intrusion_detection
Computer Associates' IDS solution.
Internet Security Systems
http://www.iss.net
A host-based tool, S2 identifies and reports exploitable system weaknesses.
Intruder Alert
http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=48&PID=1318l45
Allows enterprise security monitoring with detection and response to attacks in real-time.
Intrusion, Inc.
http://www.intrusion.com
Maker of SecureNet Pro, a commercial network intrusion detection (NIDS) product suite.
LANguard
http://www.gfi.com/lanselm/index.html
Intrusion detection, content filtering, security scanner, Internet access control, network security, Internet monitoring.
MacAnalysis
http://www.securemac.com/macanalysis.php
Macintosh security auditing suite.
Neogenesys
http://www.neogenesys.com.mx
Multi-platform security, detect, and audit of AS/400, UNIX, Linux, and Windows NT/2000 operating systems.
NetBrowser Communications, Inc.
http://www.netbrowser.com
Provides Web-based monitoring solutions for mission-critical applications.
Next Generation Security Technologies
http://www.ngsec.com
Home of NGSecureWeb.
Network Flight Recorder
http://www.nfr.net
Clue-gathering tools for network and security managers from which an IDS can be built; source code is free.
Network Security Associates
http://network-security-associates.com
Service provider specializing in network security using products from Microsoft and Cisco.
NIKSUN Inc.
http://www.niksun.com
Network performance monitoring, security surveillance, and forensic analysis tools serving a wide range of protocols and interfaces, ranging from Ethernet and Gigabit Ethernet to OC-3; their network appliances continuously capture and analyze LAN, MAN, and WAN traffic at gigabit rates in a single platform.
NitroGuard
http://www.nitrodata.com
Suppliers of NitroGuard, the intrusion-prevention device based on their open-source HogWash software; emphasis is on prevention rather than detection.
Nokia Intrusion Detection
http://www.nokia.com/securitysolutions/network/iss.html
Nokia's network security appliance featuring the RealSecure intrusion-detection engine.
nPatrol
http://www.nsecure.net
An adaptive IDS from nSecure.
PENS Dragon IDS
http://www.securityware.co.uk/intrusion-detection/
The PENS Dragon IDS.
Recourse Technologies
http://www.recourse.com
A provider of threat management services designed to contain, control, and respond to network intrusions and denial-of-service attacks.
ShadowSecurityScaner
http://www.rsh.kiev.ua
Network security tools and product
Silicon Defense — Intrusion Detection
http://www.silicondefense.com
They offer Snort and technical support services.
SPECTER Intrusion Detection System
http://www.specter.com
Official site of the SPECTER IDS.
TriGeo Network Security, Inc.
http://www.trigeo.com
A software development and network security services firm.
Tripwire, Inc.
http://www.tripwire.com
Data integrity system that detects unauthorized changes to data on servers and routers and sends notifications; immediate remediation of altered data is possible.
UAC Intrusion Alert
http://www.uac.com/Products/Intrusion_Detection/intrusion_detection.html
A Linux-based IDS with an easy-to-use graphical interface.
Veracity
http://www.veracity.com/
A portable data integrity security tool that detects unauthorized changes in file systems by monitoring the cryptographic checksums of files.
Who's Spying on you
http://www.spydetect.com
Anti-snoopware, spyware site.