The Web    Google
Intrusion Detection Players

Intrusion Detection Players
October 1, 2000

A Sampling of Intrusion Detection Players

  Company Location URL Comments  
  Check Point Software Technologies Ltd. Redwood City, Calif. Check Point RealSecure IDS works in conjunction with Check Point FireWall-1 and VPN-1  
  ClickNet Security Technologies Corp. San Jose, Calif. Server-based product, entercept, focuses on protecting computer operating systems and applications  
  Computer Associates International Inc. Islandia, N.Y. eTrust intrusion detection product is part of eTrust suite  
  CyberSafe Corp. Seattle Centrax software combines host- and network-based IDS, and includes network node intrusion detection  
  Internet Security Systems Inc. Atlanta Provides integrated host- and network-based IDS Inc. Richardson, Texas Offers SecureNet Pro and the Kane family of IDS products  
  Network Flight Recorder Inc. Rockville, Md. Offers customizable IDS, network monitoring and analysis tools; NASA plans to deploy NFR technology  
  Network ICE Corp. San Mateo, Calif. ICEcap Security Suite for B2B and corporate environments  
  PGP Security (a Network AssociatesInc. business) Santa Clara, Calif. Products include Gauntlet Firewall, PGP, Data Security, CyberCop Scanner and Monitor  
  Raytheon Co. Lexington, Mass., SilentRunner is designed to detect threats from within an organization  
  Sanctum Inc. Santa Clara, Calif. Former Perfecto Technologies offers AppShield, an application-level IDS that prevents unauthorized application manipulation  
  Symantec Corp. Cupertino, Calif. Offers host- and network-based IDS through company acquisition of Axent Technologies  
  TripWire Inc. Portland, Ore. Based on the former freeware tool, product detects breaches by monitoring files for unauthorized changes  


  • Linux Security: Tips from the Experts
  • Major Vendors Team for Open Security Standard
  • 9/9: Mydoom-U Worm Packed with UPX
  • NIKSUN offers a security camera for your network
  • 4/22: CashGrab-A Hits Bank Customers
  • How hacking has entered the age of mass production.
  • Single Network Identity: Holy Grail or Nightmare?
  • 2/21: MyDoom-BE Worm Harvests Addresses
  • 12/9: Setclo-A Worm Carries Executable
  • 6/14: Sober-H Emails Messages in German
  • Making Outlook Less Insecure
  • Discussion on Security Camera