Report

Industry Report

Intrusion Detection & Prevention Systems (IDS/IPS)

Why Do IDS/IPS Solutions Need to Evolve to Stay Effective?

A comprehensive survey of network security professionals recently conducted by Cybersecurity Insiders reveals that Intrusion Detection and Prevention Systems (IDS/IPS) continue to be one of the most widely deployed security tools in the world. However, respondents also raised serious concerns about IDS/IPS’ ability to detect and protect against the most advanced threats.

The report presents the results of this new survey. Key findings include:

  • 45% of respondents consider inaccurate, noisy alerts as their biggest headache
  • 51% of respondents want their IDS/IPS to improve detection of anomalous and evasive traffic
  • 64% of respondents require expanded IDS/IPS protocol and application coverage for cloud-based business apps (Salesforce, Office 365, etc.)
  • 23% of respondents need better traffic visibility in encrypted environments

Security practitioners will find the report useful in evaluating their own cybersecurity strategies, and IDS/IPS developers will be able to align product roadmaps with evolving user needs and concerns.

Related insights

TLS 1.3 ECH - Encryption - How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

TLS 1.3 ECH – How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

Read more

Tags: Cybersecurity, Deep Packet Inspection, Encryption, SASE, SD-WAN, Threat Detection, ZTNA

Two-Thirds of Enterprises Endure Significant Losses to Mobile Fraud in 2024

Read more

Tags: Cybersecurity, MNO, Mobile Security, MVNO

COTS

Enea’s Blog Detailing Methods of Tracking Mobile Devices in Modern Warfare Featured in COTS Journal

Read more

Tags: Cybersecurity, Mobile Security, Mobile Surveillance

Help Net Security logo

Vishing, Smishing and Phishing Attacks skyrocket 1,265% post Chat-GPT

Read more

Tags: Cybersecurity, MNO, Mobile Security, SMS

Commsrisk logo

How Russia and Ukraine Track Mobile Phones on the Battlefield, Featuring Insights from Enea’s Report

Read more

Tags: Cybersecurity, Mobile Network Threat, Mobile Security, Mobile Surveillance