Today, 
 Welcome 

   

Surf to LSD Home Page

Donate
Look up for the news ;)

  Babelfish
  French
  Spanish
  German
  Italian
  Portuguese
  Japanese
  Korean
  Dutch
  Greek
  Russian
  Chinese (trad.)
  Chinese (simp.)

Cert Teams

Vendor Security

Vendors

NON commercial or cool security sites

Contact

Your System Check:

Liquidmatrix, the LSD logo, its likeness, and these pages Copyslight © 1998 - 2006 Liquidmatrix Solutions & Design All Rights Obscured...whatever.

 

   

  Liquidmatrix: Intrusion Detection Page

  BlackICE • NetworkICE Corp.

External  
Network ICE is the premier provider of anti-hacker software for every system on the Internet. Whether you need to protect thousands of systems or just one, Network ICE has the product that will protect you.

BlackICE



  Bro • Detecting Network Intruders in Real-Time.

External  
Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998. This version of the paper differs from that in the printed Proceedings in that an error in the performance analysis, which overstated the load on the FDDI ring by a factor of two, has been corrected.

Bro: Lawrence Berkeley National Laboratory



  Cisco • Secure Intrusion Detection System (NetRanger)

External  
"The Cisco Secure Intrusion Detection System, formerly known as NetRanger, is built to provide the ease of use, scaling, performance, and reliability required for an enterprise network operation." --mktg

Cisco SecureIDS



  CyberCop Monitor • NAI

External  
"As hackers become more sophisticated, traditional intrusion detection systems (IDS) can't keep pace. Protect your vital operations with a pioneering IDS: CyberCop Monitor." --mktg

CyberCop Monitor



  Dragon • Network Security Wizards

External  
"The Dragon IDS meets the challenges of watching over a modern network by providing high speed sensors to detect suspicious activity, forensic data to determine the impact of network attacks and the scalability to deploy and manage large numbers of sensors without negatively impacting the operation of large networks." --mktg

Dragon



  Intruder Alert • Symantec

External  
"Intruder Alert detects unauthorized and malicious activity, keeping systems, applications and data secure from misuse and abuse. If these systems are threatened, Intruder Alert can notify you and even take precautionary actions to prevent information theft or loss." --mktg

Intruder Alert



  NetProwler • Symantec

External  
"NetProwler's exclusive, patent-pending Stateful Dynamic Signature Inspection (SDSI) virtual processor not only prevents intruders from exploiting hundreds of known and new security flaws in real time, but its attack definition wizard enables network administrators to protect exposed corporate applications and stop even the most sophisticated assaults." --mktg

NetProwler



  Network Intrusion Detection • NFR

External  
"NFR Network Intrusion Detection (NFR NID) is an intrusion detection system that unobtrusively monitors networks in real time for activity such as known attacks, abnormal behavior, unauthorized access attempts and policy infringements. Information associated with activity that may be suspicious is recorded and alerts raised as necessary." --mktg

NFR NID



  NID • Lawrence Livermore National Labratory

External  
"The DoD version of NID (called JIDS) is available to DoD entities and DoD contractors at the DISA INFOSEC Tools Distribution site. If you are a DoD entity, download JIDS from that location." --mktg

NID LLNL



  Realsecure • ISS

External  
"Internet Security Systems (ISS) provides RealSecure, the industry's first completely integrated host- and network-based intrusion detection platform." --mktg

Realsecure



  SecureNet Gig Security Appliance • Intrusion.com

External  
"Intrusion.com SecureNet Gig is the first integrated intrusion detection solution designed for gigabit networks. Featuring SecureNet Pro software pre-installed on a 1U-high, rack-mountable appliance, SecureNet Gig delivers industry leading throughput performance and accurate attack detection -- extending network intelligence to the border of the enterprise and within gigabit backbone DMZs and critical network segments." --mktg

SecureNet Gig Security Appliance



  SHADOW

External  
"SHADOW is the result of a project that was originally called the Cooperative Intrusion Detection Evaluation and Response (CIDER) project. It was an effort of NSWC Dahlgren, NFR, NSA, the SANS community and other interested parties to locate, document, and improve security software. The material on this page is approved for public release, distribution is unlimited. " --mktg

editor's choice!

SHADOW



  Snort

External  
"Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more." --mktg

editor's choice!

Snort



  SecureWay • Tivoli

External  
"Tivoli SecureWay provides a single interface for maintaining security profiles and policies across heterogeneous systems in mainframe, distributed and desktop environments." --mktg

Tivoli SecureWay