In the past couple of years, technologies such as intrusion detection and protection systems have become mainstream tools in the corporate security arsenal. But many feel less than satisfied with the performance of some of these technologies. . . .
In the past couple of years, technologies such as intrusion detection and protection systems have become mainstream tools in the corporate security arsenal. But many feel less than satisfied with the performance of some of these technologies. In particular, the number of false positives - when a legitimate piece of communication is flagged as being a possible security threat - is proving to be expensive for organisations in terms of the amount of time IT staff must spend dealing with what is actually legitimate traffic.

This may seem to be a small problem, but companies today are faced with so many vulnerabilities that anything that can free up scarce IT resources from such manual chores is to be welcomed. According to security vendor Sourcefire, organisations are becoming so porous that the concept of a perimeter as a line of defence is not really solid enough any more. Instead, companies now face a wide range of security vulnerabilities, including insider attacks, infected laptops, denial of service attacks and policy violations. Add to this the security threats posed by wireless networks and companies will find their IT resources stretched too far.

The link for this article located at IT Analysis is no longer available.