There are a variety of factors here. I assume you mean a network-based IDS,
rather than host-based, and that you want to do packet inspection.

Snort, suricata, and bro are popular open source options. I recommend
subscribing to some kind of threat feed to get new IDS rules from a vendor
or community. I'm not sure what's available for suricata or bro but for
Snort you could get the emergingthreats feed or pay for the VRT from
Sourcefire/Cisco (the corporate ummm sponsor of Snort).

If you want high performance, say 10Gb, then your needs are sorta special.

I've liked the scenario of deploying both snort with a threat feed and bro
as complementary. I haven't played with suricata.

Is this the kind of thing you have in mind? If you have a big budget there
are also commercial options we could discuss.

Matt



On Fri, Feb 28, 2014 at 11:25 AM, Ali Sajid Imami <ali.sajid.im...@gmail.com
> wrote:

> At work, we have been tasked with setting us up for various security
> certifications. one step is putting a good IDS in place. I was wondering if
> people here had any good recommendations?
>
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
>
>
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to