Intrusion Detection Systems

Protecting networks against intruders and unauthorized activities is increasingly important to organizations as e-Commerce, intranets, and extranets become vital to regular business operations. Security administrators face increasingly sophisticated attacks from both internal and external users, often finding that they must introduce a second line of defense behind already fortified perimeters.

Intrusion Detection Systems (IDS) technologies help to alleviate some of this burden by acting as a virtual security agent. IDS technology is an important component of a comprehensive enterprise security strategy. It has long been a subject of theoretical research, but is now gaining mainstream popularity due to its practical application in corporate risk management. IDS products alert security administrators of suspicious activity occurring on their systems and networks in real time. Real time alerts allows for faster and more deliberate responses by the IT team.

IrisLogic offers Check Point RealSecure as a comprehensive SecurNet IDS solution for your organization. Check Point RealSecure provides IDS security through its market leading attack recognition and response system.

Features

Integrated with VPN-1 and FireWall-1, Check Point RealSecure provides the highest level of real-time intrusion detection by enabling network administrators to establish a coherent enterprise-wide security policy. Check Point RealSecure provides the most secure, efficient intrusion detection management available today, with a continuously updated attack recognition database. It simplifies the complex task of configuring and setting up an intrusion detection system by eliminating the need to re-enter network objects that have already been entered into your FireWall-1 or VPN-1 policy. It also provides advanced reporting of intrusions and network misuse, including event consolidation into existing VPN-1/FireWall-1 log files for simplified event auditing.

RealSecure uses a standards-based approach that compares network traffic and host log entries to known and likely methods of attacks. Suspicious activities trigger administrator alarms and other configurable responses. RealSecure is specifically designed to lessen the workload of security administration and easily integrates with leading network and systems management applications. Its monitoring parameters easily adjust to different network situations and feature components, and are readily configured from a central console.