Intrusion Detection Systems (IDS)

IDS are found on Layer 2 of the TCP/IP model.

An IDS is designed to monitor a network in real-time, identify potential threats for malicious activity or policy violations, identify potential threats early, and notify the IPS for handling and SIEM for Cyber Security logging and monitoring.

Back to Glossary
Share
Linkedin Icon Twitter Icon Facebook Icon E-mal Icon
Get in touch

Talk to us

Do you want to remove your IP/domain from one of our blocklists?
Please use our lookup-service and follow the instructions there in order to get that resolved.