The issue may also be the analyst/administrators. Were they of sufficient skill 
to admin the IDS/IPS products (really Aditya's items 2 through 4) and were they 
knowledgeable enough to actually "monitor and analyze IDS/IPS logs and 
reports"? If an analyst is not sure of the impact of a possible event the 
likelihood that it would be reported up the food chain is nill. Should it 
actually be reported up the food chain, if the analyst is not able to verbalize 
the impact, the report will only make it one level up and nothing will be done 
with it.

All too often an org will minimize cost at the personnel level by leveraging 
staff already on board but maybe not qualified for the role. I would also make 
the conjecture that there was limited buy in of the need for IDS/IPS in the 
environment. But, Aditya makes the point, "what are you protecting"? The 
President or ... the junior analyst =) Maybe they did not need it in that 
environment. I am assuming a "large telecom" has many segments in their 
network, some of which would absolutely need IDS/IPS. Others... maybe not so 
much.

jk

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of aditya mukadam
Sent: Wednesday, March 04, 2009 7:55 AM
To: [email protected]
Cc: Ravi Chunduru
Subject: Re: ROI on IDS/IPS products


 It was felt that they did not find enough ROI to
> justify 2 dedicated personnel to monitor and analyze IDS/IPS logs and
> reports. It apperas that no major incidents were detected by network
> IPS devices. i also was told that these IPS devices are from industry
> leaders.

I read the above with below example :
A residential building has a gate,wall and few security personnel for
safety against theft etc. In two years, there was no major theft or
issues and hence the residents decided to remove the building gate,
security personnel !  Oh yes, the security guards were black cat
commandos !

Your discussion with the security administrator was very interesting
however it would be good to know:
1) How and were are the IPSs placed in the network ?
2) What Signature profile are they using for these IPSs ? Many IPSs
comes with default settings for low detection.
3) Did they tune the IPSs as per their own requirement ?
4) How often they patched the IPSs ?
Lastly, are the IPSs purchased because they were needed *or*  the
company was fooled to buy it or had budget/ policies/ vendor
commitment to buy it   ?

It all depends what are you safe guarding !

For example: A common man's residential building will have 1 security
guard however the President's residence will have range of security
gadgets, various check points, many many security guards !!!

Thanks,
Aditya Govind Mukadam


On Fri, Feb 27, 2009 at 10:38 PM, Ravi Chunduru
<[email protected]> wrote:
> I was talking to a junior security administartor working for a big
> telecom company.  He said something which is worrying.  After few
> years of IPS deployment in particular department, they  decided to
> remove IPS devices.  It was felt that they did not find enough ROI to
> justify 2 dedicated personnel to monitor and analyze IDS/IPS logs and
> reports. It apperas that no major incidents were detected by network
> IPS devices.  they felt that signature coverage is either poor or not
> timely. i also was told that these IPS devices are from industry
> leaders.
>
> Can you share your experiences?  Any examples of successful detection
> and prevention of major attacks and penetration by IPS devices.
>
> Thanks
> Ravi
>
>
>




Reply via email to