Intrusion detection systems (IDS) monitor your network for attempts to break in. Attacks are logged as they happen and also whether they were successful or not.
Intrusion detection systems (IDS) are usually part of a firewall or other larger system. They monitor the connections being attempted and compare them to known threats and profiles or suspected threats. Each threat is logged as well as weather it was successful or not plus what other actions were taken. IDS systems do not necessarily attempt to thwart attacks, they simply detect them as they happen. This may not seem that useful at first, but consider a secured network. If all attacks are blocked by the system, the IDS provides confirmation that the system is working as it should and stopping potential threats. It also provides a unique view into threats that happen to get through as well as a way to track the person responsible.
For more information or to schedule an appointment for one of our representatives to discuss intrusion detection systems, give us a call.