This document provides an overview of how an intrusion detection system (IDS) can be used to collect information on threats both internal and external to an organization. It discusses how an IDS, when used with other security tools and coordinated response from security experts, can help identify security incidents, protect systems and data, and keep an organization running securely. The document also outlines the types of skilled security personnel needed to effectively manage an IDS program.
This document provides an overview of how an intrusion detection system (IDS) can be used to collect information on threats both internal and external to an organization. It discusses how an IDS, when used with other security tools and coordinated response from security experts, can help identify security incidents, protect systems and data, and keep an organization running securely. The document also outlines the types of skilled security personnel needed to effectively manage an IDS program.
This document provides an overview of how an intrusion detection system (IDS) can be used to collect information on threats both internal and external to an organization. It discusses how an IDS, when used with other security tools and coordinated response from security experts, can help identify security incidents, protect systems and data, and keep an organization running securely. The document also outlines the types of skilled security personnel needed to effectively manage an IDS program.