Stories by John Bonamico

Host-based IDSs add to security policy

If the security threats of the past few weeks have taught us anything, it is that virus writers and hackers are creating more complex attacks that are better able to bypass perimeter security measures. Network-based intrusion-detection systems no longer suffice as the lone monitor for intrusions. A key component of an integrated security strategy to complement network-based IDSs is a host-based IDS.

Market Place