Intrusion Detection System (IDS) Deployment
The security threat landscape is changing constantly as malicious attackers continually find new ways to compromise today's networks. To combat this threat, network security best practices include implementing a layered security approach to minimize the chance of a breach. In short, any single defensive monitoring tool may be flawed, so a series of diverse defenses can cover any gaps in the protective capabilities of the others. Firewalls, intrusion detection systems, malware scanners, integrity auditing procedures, and local storage encryption tools each serve to protect your information technology resources in ways the others cannot.
An IDS acts as an effective second layer of defense for your network. Placed between the firewall and the system being secured, a network-based intrusion detection system provides an extra layer of protection. For example, monitoring access from the internet to sensitive network ports can determine whether the firewall has been compromised or an attacker has bypassed the security mechanisms of the firewall to gain access.