Intrusion Detection Services
Network-based intrusion detection monitors your network for hostile traffic that batters a network and renders it incapable of supporting employees in accomplishing their daily electronic tasks.
About Network-Based Intrusion Detection Service
When properly implemented and monitored, network intrusion detection allows you to react appropriately when someone breaches your network, preventing costly network down-time. Intrusion detection tools, in the hands of a properly trained security IT professional, can often identify network and security problems BEFORE they are exploited.
About Host-Based Intrusion Detection Service
In contrast to network-based intrusion detection systems (IDS), host-based IDS's are able to monitor the computer's files and processes for attack signatures. Whereas a network-based IDS can inform you that an attack was launched against a certain host, a host-based IDS can tell you if that attack was successful. In addition, host-based IDS's can inform you of attacks that cannot be detected by a network-based IDS, perhaps due to the fact that it is taking place over an encrypted protocol (e.g., SSH, SSL, IPSEC), or because the attacker is sitting at the host's local console.
Key Points of the Services
Our service includes installing, configuring, and maintaining sensors on the appropriate components within your system. These sensors are monitored daily with after-hours alerts to security and network personnel. We provide periodic reports and immediate notification of your key personnel of any intrusion event.
Additional Service Options
A customer may select for ITE security professionals to respond in the event of an incident. This includes assistance in isolating the attack, responding, and developing the appropriate solutions to eliminate the exploited vulnerability.
ITE maintains a test lab in support of device testing. A customer can have ITE test new devices for a variety of consistency and security purposes prior to the client fielding the device. This includes installing any necessary monitoring devices and/or software.
Our Customers can focus on their business knowing
their network is being properly monitored and defended against hackers
and other intrusion events.