Hello The following links might help you with this:
Gartner Magic Quadrant for Network Intrusion Prevention System Appliances ... http://www-935.ibm.com/services/us/iss/pdf/esr_magic-quadrant-for-network-intrusion-prevention-system-appliances-1h08.pdf Frost-n-Sullivan-World Intrusion Detection and Prevention Systems Markets N22B-74 http://www-935.ibm.com/services/us/iss/pdf/esr_intrusion-detection-and-prevention-systems-markets.pdf http://www.networkworld.com/buyersguides/guide.php?cat=865474 But as you can see......opinions vary :) Regards Farrukh CCIE # 20184 (Security) > > > On Thu, May 8, 2008 at 8:40 PM, Basem Barakat <[EMAIL PROTECTED]> wrote: >> >> Hello Shelly, >> >> Intoto offers IntruPro IPS which is deployed in the L2 mode. >> So it would be deployed along with you're your Sonicwall gateway. >> It offers very much what you want. >> >> Binaries are available for free download from http://wiki.intoto.com/ >> >> Basem >> >> >> -----Original Message----- >> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On >> Behalf Of Shelly Beasley >> Sent: Wednesday, May 07, 2008 3:01 PM >> To: [email protected] >> Subject: Best IPS system? >> >> Hello mailing list, >> >> I would like to buy the "best" system available to the IPS network of >> my business. My company has only 200 users, all share an Internet >> connection (10 m). We now use Sonicwall to connect, but we are >> concerned about the hostile e-mails, malware websites, and people in >> piracy. Who produces the best job? Which is most capture hacker >> attempts? The product should not interfere with operations on the >> network (all connection is filled by the backup off-site at nite). >> >> Many thanks, >> >> SB >> >> ------------------------------------------------------------------------ >> Test Your IDS >> >> Is your IDS deployed correctly? >> Find out quickly and easily by testing it >> with real-world attacks from CORE IMPACT. >> Go to >> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=in >> tro_sfw >> to learn more. >> ------------------------------------------------------------------------ >> >> >> ******************************************************************************** >> This email message (including any attachments) is for the sole use of the >> intended recipient(s) >> and may contain confidential, proprietary and privileged information. Any >> unauthorized review, >> use, disclosure or distribution is prohibited. If you are not the intended >> recipient, >> please immediately notify the sender by reply email and destroy all copies >> of the original message. >> Thank you. >> >> Intoto Inc. >> >> >> ------------------------------------------------------------------------ >> Test Your IDS >> >> Is your IDS deployed correctly? >> Find out quickly and easily by testing it >> with real-world attacks from CORE IMPACT. >> Go to >> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw >> to learn more. >> ------------------------------------------------------------------------ >> > ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------
