Here at my work im running a TIPPINGPOINT 200 IPS and it´s great.

Leandro A. Venturini
Centro de Tecnología Informática
Universidad Nacional de La Matanza
WEB: http://www.unlam.edu.ar
Tel: 44-80-89-97
Cel:15-30-83-92-99
 
-----Mensaje original-----
De: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] En nombre de Andrew Plato
Enviado el: martes, 21 de octubre de 2008 19:17
Para: Rafael Dreher; Security Group; [email protected]
Asunto: RE: Host Based IDS

Very good Network IPS. Easy to use. Reliable. Good performance. We do a lot of 
pen testing and TippingPoints are consistenty one of the more difficult IPSs to 
penetrate.

TP is more oriented toward "set it and forget it." If you are a person who 
wants an IPS that gives you all the gory details and allows you to fiddle with 
every possible aspect of signatures, then TP probably isn't your choice.  Its 
more oriented toward places that need strong application-layer filtering and 
detection and do not want to fiddle with signatures. 

And yes, my company sells TippingPoint. 

Andrew Plato, CISSP, CISM, QSA
President/Principal Consultant
Anitian Enterprise Security 
 

-----Original Message-----
From: Rafael Dreher [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 9:32 AM
To: Andrew Plato; 'Security Group'; [email protected]
Subject: RES: Host Based IDS

Does anyone has an opinion on TippingPoint UnityOne IPS?

I thinks it´s a really good one.

--
Rafael Dreher
Analista de Infra-Estrutura de Segurança Projetos de Infra-estrutura de TI 
Confederação SICREDI - Porto Alegre
(51) 3358-8363 /(51) 9275-9014
http://www.sicredi.com.br


> -----Mensagem original-----
> De: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Em nome de Andrew Plato
> Enviada em: terça-feira, 21 de outubro de 2008 13:00
> Para: Security Group; [email protected]
> Assunto: RE: Host Based IDS
> 
> I like IBM-ISS Proventia. It's a very powerful HIPS/HIDS. Hard to beat
> the old BlackICE engine that's inside it. Its still one of the best
> IDS/IPS engines on the market.  The new Proventia Server 2.0 has a very
> rich feature set. And IBM-ISSs integration with their scanner, NIPS and
> ADS via SiteProtector is very powerful. It does have a steep learning
> curve however.
> 
> Tripwire, incidentally is not  HIDS/HIPS. It is a file integrity
> monitoring product. Useful, but IBM Proventia has that plus a whole lot
> more.
> 
> Andrew Plato, CISSP, CISM, QSA
> President/Principal Consultant
> Anitian Enterprise Security
> 
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]
> On Behalf Of Security Group
> Sent: Monday, October 20, 2008 5:13 AM
> To: [email protected]
> Subject: Host Based IDS
> 
> Hello,
> 
> I am currently evaluating several host-based Intrusion Detection
> Systems
> to monitor servers in a DMZ. My company only wants to monitor for
> suspecious behaviour on critical servers, without the need for a
> company
> wide security system. I am not interested in a network-bases ids
> because
> this is already covered by our company.
> The list below contains my findings so far;
> 
> OSSEC
> Open Source Tripwire
> SAMHAIN
> OSIRIS
> AIDE
> Third Brigade Deep Security
> Symantec Critical System Protection
> IBM Proventia
> Enterasys Dragon IDS/IPS
> McAfee Total Protection for Endpoint
> CA Host-Based Intrusion Prevention System r8 GFiEventsManager Cisco
> Security Agent
> 
> I am thinking of suggesting OSSEC. Does anyone have any other
> suggestions?
> 
> Thanks in advance.
> 
> _________________________________________________
> NOTICE:
> This email may contain confidential information,
> and is for the sole use of the intended recipient.
> If you are not the intended recipient, please reply
> to the message and inform the sender of the error
> and delete the email and any attachments from
> your computer.
> _________________________________________________
> 
> 
> 
> -----------------------------------------------------------------------
> -
> Test Your IDS
> 
> Is your IDS deployed correctly?
> Find out quickly and easily by testing it
> with real-world attacks from CORE IMPACT.
> Go to
> http://www.coresecurity.com/index.php5?module=Form&action=impact&campai
> gn=intro_sfw
> to learn more.
> -----------------------------------------------------------------------
> -



As informacoes contidas neste e-mail e anexos podem ser confidenciais e 
privilegiadas, protegidas por sigilo legal. Qualquer forma de utilizacao deste 
documento depende de autorizacao do emissor, sujeito as penalidades cabiveis. O 
emissor utiliza o recurso somente para fins profissionais, eximindo o 
empregador de responsabilidades por uso pessoal ou improprio. Se esta mensagem 
foi recebida por engano, o conteudo deve ser apagado e o remetente avisado 
imediatamente, atraves de resposta a este e-mail.

_________________________________________________
NOTICE:
This email may contain confidential information, 
and is for the sole use of the intended recipient.  
If you are not the intended recipient, please reply 
to the message and inform the sender of the error 
and delete the email and any attachments from 
your computer. 
_________________________________________________



------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

 

__________ Information from ESET NOD32 Antivirus, version of virus signature 
database 3545 (20081022) __________

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com
 
 

__________ Information from ESET NOD32 Antivirus, version of virus signature 
database 3546 (20081022) __________

The message was checked by ESET NOD32 Antivirus.

http://www.eset.com
 

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------

Reply via email to