Senior Consultant at a tech services company with 51-200 employees
Real User
2022-02-02T23:47:53Z
Feb 2, 2022
The Hillstone I-Series Server Breach Detection System sits inside on the intranet level. For example, if I have a stop net or a certain VLAN territory and I want to implement certain protections against an intrusion for the servers I would deploy the stop hardware within the intranet of the network. This is internal network protection to create a deterrent against inside would-be hackers within the same premise. Most of the time, networks are compromised from the inside, not from the outside.
Find out what your peers are saying about Hillstone Networks, Ziften, Darktrace and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
We are using Hillstone I-Series Server Breach Detection System to look for threats in our network, such as barriers and malicious software.
The Hillstone I-Series Server Breach Detection System sits inside on the intranet level. For example, if I have a stop net or a certain VLAN territory and I want to implement certain protections against an intrusion for the servers I would deploy the stop hardware within the intranet of the network. This is internal network protection to create a deterrent against inside would-be hackers within the same premise. Most of the time, networks are compromised from the inside, not from the outside.