An Intrusion Detection System (IDS) is a device or software application that monitors networks and system activities for malicious actions or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system.
With ever-increasing reliance on Internet, Intranet and Extranet access comes the parallel demand for Intrusion Detection Systems (IDS) within the defences of enterprise wide systems architecture. The result has been a plethora of new products, offering a bewildering variety of good solutions. So to cut to the chase, we start with the good questions:
This approach ensures that the solution Cyber Crime Awareness Society designs is tailored logically to your needs and because we operate independently of vendors, you can rely on CCAS to recommend products that will work effectively, without overkill. We will provide you with impartial, practical advice on the best combination of products and the best way to use them. This advice will cover:
If unauthorised access is attempted, you’ll know about it.
If unauthorised access to systems that matter is attempted, you’ll know about it yesterday.
CCAS's skill lies in helping you put the right product in the right place to the greatest effect.