Security

Use an IDS to thwart hackers

Use our Intrusion Detection Systems Pack to better determine your security needs.


The ever-increasing sophistication of network threats emphasizes the need for today's network administrators and IT managers to plan, deploy, and maintain airtight security. Hackers will exploit any hole in your line of defense. However, you can limit their window of opportunity by purchasing an intrusion detection system (IDS).

Our Intrusion Detection Systems Pack includes three tools, described in detail below, that will help you decide whether an IDS will meet your organization's needs, choose the right IDS vendor, and check vendors' references.

The Gap Analysis: Intrusion Detection Systems tool's three detailed worksheets (Requirements, Gap Report, and Solution Benefits) will help you determine whether a gap exists between your current system's security capabilities and your organization's future requirements. If you establish that a gap exists, our tool will also help you determine if an IDS can help you close those gaps.

The Vendor Selection Checklist: Intrusion Detection Systems tool's detailed worksheets (Criteria Ranking, Vendor, and Comparison) will help you assess the IDS products and services available from various vendors so that your determination is based on the facts and issues most applicable to your organization's needs.

The Vendor Reference Questionnaire: Intrusion Detection Systems tool allows you to record important contact and demographic information on up to six separate references. Find out how each reference rates the vendor(s) on 10 critical, technology-specific questions. When you’ve completed the data from all the references you’re contacting, the tool will pull the information into the Comparison worksheet for a side-by-side look at how their vendor ratings stack up.

Click here to check out our Intrusion Detection Systems Pack.

Editor's Picks