Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware, and Projects


IDS Commercial Products and Services

Blue Lance LT Auditor+
http://www.bluelance.com
LT Auditor+ enables administrators to track network activity and alerts users to intrusions through e-mail or paging.

Cisco Systems IDS
http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml
The Cisco Secure Intrusion Detection System is an enterprise-scale, real-time system designed to detect, report, and terminate unauthorized activity throughout a network.

CyberCop
http://www.cybercop.co.uk
Intrusion detection and protection systems, including CyberCop Scanner, CyberCop Monitor, CyberCop Sting, and CyberCop CASL.

CyberSafe
http://www.cybersafe.com
CyberSafe is a software publisher specializing in the development and implementation of network security solutions, such as Centrax IDS.

Cyber Trace
http://www.cybertrace.com/ctids.html
A network security management system.

Demrac PureSecure — Total Intrusion Detection System
http://www.demarc.com
Demarc Security offers PureSecure, an all-inclusive network monitoring service that allows users to monitor an entire network of servers from a Web interface; combines NIDS, HIDS and Host/Service monitoring functionality.

eCom Corporation
http://www.e-com.ca/eSCAN
A source for firewall security, intrusion detection systems, network security, network security management, computer network security, network security monitoring, computer security, Web security, e-security, and NT security.

eTrust
http://www.cai.com/solutions/enterprise/etrust/intrusion_detection
Computer Associates' IDS solution.

Internet Security Systems
http://www.iss.net

A host-based tool, S2 identifies and reports exploitable system weaknesses.

Intruder Alert
http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=48&PID=1318l45
Allows enterprise security monitoring with detection and response to attacks in real-time.

Intrusion, Inc.
http://www.intrusion.com
Maker of SecureNet Pro, a commercial network intrusion detection (NIDS) product suite.

LANguard
http://www.gfi.com/lanselm/index.html
Intrusion detection, content filtering, security scanner, Internet access control, network security, Internet monitoring.

MacAnalysis
http://www.securemac.com/macanalysis.php
Macintosh security auditing suite.

Neogenesys
http://www.neogenesys.com.mx
Multi-platform security, detect, and audit of AS/400, UNIX, Linux, and Windows NT/2000 operating systems.

NetBrowser Communications, Inc.
http://www.netbrowser.com
Provides Web-based monitoring solutions for mission-critical applications.

Next Generation Security Technologies
http://www.ngsec.com
Home of NGSecureWeb.

Network Flight Recorder
http://www.nfr.net
Clue-gathering tools for network and security managers from which an IDS can be built; source code is free.

Network Security Associates
http://network-security-associates.com
Service provider specializing in network security using products from Microsoft and Cisco.

NIKSUN Inc.
http://www.niksun.com
Network performance monitoring, security surveillance, and forensic analysis tools serving a wide range of protocols and interfaces, ranging from Ethernet and Gigabit Ethernet to OC-3; their network appliances continuously capture and analyze LAN, MAN, and WAN traffic at gigabit rates in a single platform.

NitroGuard
http://www.nitrodata.com
Suppliers of NitroGuard, the intrusion-prevention device based on their open-source HogWash software; emphasis is on prevention rather than detection.

Nokia Intrusion Detection
http://www.nokia.com/securitysolutions/network/iss.html
Nokia's network security appliance featuring the RealSecure intrusion-detection engine.

nPatrol
http://www.nsecure.net
An adaptive IDS from nSecure.

PENS Dragon IDS
http://www.securityware.co.uk/intrusion-detection/
The PENS Dragon IDS.

Recourse Technologies
http://www.recourse.com
A provider of threat management services designed to contain, control, and respond to network intrusions and denial-of-service attacks.

ShadowSecurityScaner
http://www.rsh.kiev.ua
Network security tools and product

Silicon Defense — Intrusion Detection
http://www.silicondefense.com
They offer Snort and technical support services.

SPECTER Intrusion Detection System
http://www.specter.com
Official site of the SPECTER IDS.

TriGeo Network Security, Inc.
http://www.trigeo.com
A software development and network security services firm.

Tripwire, Inc.
http://www.tripwire.com
Data integrity system that detects unauthorized changes to data on servers and routers and sends notifications; immediate remediation of altered data is possible.

UAC Intrusion Alert
http://www.uac.com/Products/Intrusion_Detection/intrusion_detection.html
A Linux-based IDS with an easy-to-use graphical interface.

Veracity
http://www.veracity.com/
A portable data integrity security tool that detects unauthorized changes in file systems by monitoring the cryptographic checksums of files.

Who's Spying on you
http://www.spydetect.com
Anti-snoopware, spyware site.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net