fbpx
Recently I was having a discussion about the use of sensors for IPS with one of my clients. I had to clarify the difference between IDS and IPS to him.
Today, I am sharing the crux of that discussion with you…
Technical factors to consider when selecting sensors for deployment in an organization include the following:
  • The network media in use
  • The performance of the sensor
  • The overall network design
  • The IPS design (Will the sensor analyze and protect many systems or just a few?)
  • Virtualization (Will multiple virtual sensors be created in the sensor?)

 

Important issues to keep in mind in an IPS design include the following:

  • Your network topology: Size and complexity, connections, and the amount and type of traffic.
  • Sensor placement: It is recommended that these be placed at those entry and exit points that provide sufficient IPS coverage.
  • Your management and monitoring options: The number of sensors often dictates the level of management you need.
 

Locations that generally need to be protected include the following:

  • Internet: Sensor between your perimeter gateway and the Internet
  • Extranet: Between your network and extranet connection
  • Internal: Between internal data centers
  • Remote access: Hardens perimeter control
  • Server farm: Network IPS at the perimeter and host IPS on the servers

 


This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM