Who and when?
Who uses an IDS/IPS? Any organization might be using it, though the cost point is a main post of consideration. The return on investment calculation for IDS/IPS is predicated based upon being able to identify mission critical elements, along with the estimated financial loss associated within each security threat. Looking at the likelihood of each event and then comparing the life cycle cost of IDS/IPS against the estimated financial loss associated with a breach.
A major consideration is the cost of managing and tuning out false positives generated by IDS/IPS. An attacker can use the false-positives as a disguise to gain access, or could use this as a diversion.
A common question is when to use each type of IDS/IPS. One must ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access