Skip Links

Network World

IDS / IPS

Buyer's Guides

We have worked with the IDS / IPS vendors to create the most comprehensive IDS / IPS buyer's guides available anywhere.

  • Intrusion Detection Systems Products
  • Network Intrusion Prevention Systems Products
Quick Glance
How products stack up based on price and target market
Compare Tool
Compare products side-by-side
Tests/Reviews
See how products fared in Network World hands-on testing
Link to This
Compare Tool
Compare products side-by-side
Tests/Reviews
See how products fared in Network World hands-on testing
Buying Info
Best practices, buying tips, case studies, and market trends
Link to This
News
1
Researcher offers tool to hide malware in .Net
A computer security researcher has released an upgraded tool that can simplify the placement of difficult-to-detect malicious software in Microsoft's...
Researcher finds possible bug in Apple's iPhone
Famed Mac hacker Charlie Miller has found another possible security vulnerability in Apple's iPhone.
Amazon.co.uk opts out of Phorm deep packet tracking
Amazon.co.uk has opted out of the Webwise deep packet inspection system being used by British telecommunications operator BT to target online...
The necessary convergence of IT and Facilities WHITE PAPER
Learn about the capabilities made possible by converging IT and Facilities and how one unified process makes sense.
UC security: When the shoe doesn't fit -- compress the foot
If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified...
1
PCI security rules may require reinforcements
The PCI standard, long touted as one of the private sector's strongest attempts to regulate itself on IT security, is increasingly being slammed by...
TippingPoint offers customer filtering service
TippingPoint will announce at next week's RSA Conference a service that creates filters for its intrusion prevention gear to block potential attacks...
Is your data center ready for virtualization? WHITE PAPER
Read this whitepaper to learn the hidden challenges and important considerations for virtualized IT environments.
1
Re-perimeterization, Part 2
If organizations (and security vendors) can regain application visibility and control the right way, enterprises will realize additional benefits:...
Why the channel should get into the DLP space
During these tough economic times, it's essential that businesses secure their confidential information using data loss prevention (DLP) solutions to...
1
The consequences of inadequate cloud security
The phenomenon of services in the cloud is well established. Some say it will become the dominant model for network infrastructure as issues of...
Achieving Business Agility with Application Grid WHITE PAPER
Companies are running their data centers more efficiently using less hardware, less software and less administration with a new approach called...
2
Internet-wide problem to be revealed at conference
Organizers of next week's Black Hat Europe conference are promising a security presentation that could impact anyone who uses the Internet, but no...
Zetta offers cloud storage for the enterprise
Start-up Zetta Inc. Monday unveiled an enterprise-class, software-as-a-service storage business with an architecture built on proprietary systems and...
All Together Now: Unified Threat Management
To protect networks and information against increasingly sophisticated threats, many organizations are deploying security in layers. Some are finding...
Marketplace

Featured products and services from trusted IDS / IPS vendors