Industry Report

Intrusion Detection & Prevention Systems (IDS/IPS)

Why Do IDS/IPS Solutions Need to Evolve to Stay Effective?

A comprehensive survey of network security professionals recently conducted by Cybersecurity Insiders reveals that Intrusion Detection and Prevention Systems (IDS/IPS) continue to be one of the most widely deployed security tools in the world. However, respondents also raised serious concerns about IDS/IPS’ ability to detect and protect against the most advanced threats.

The report presents the results of this new survey. Key findings include:

  • 45% of respondents consider inaccurate, noisy alerts as their biggest headache
  • 51% of respondents want their IDS/IPS to improve detection of anomalous and evasive traffic
  • 64% of respondents require expanded IDS/IPS protocol and application coverage for cloud-based business apps (Salesforce, Office 365, etc.)
  • 23% of respondents need better traffic visibility in encrypted environments

Security practitioners will find the report useful in evaluating their own cybersecurity strategies, and IDS/IPS developers will be able to align product roadmaps with evolving user needs and concerns.

Related insights

Mobile network security: Bridging the gap between enterprise needs and CSP capabilities

Read more

Tags: Cybersecurity , Mobile Security , network security , signaling security

Mobile Trends report cover image

5 Mobile Trends to Expect in 2024

Read more

Tags: Cybersecurity

Enea Qosmos ixEngine for ZTNA: The DPI-Based Data Foundation Trusted by ZTNA Leaders

Enea Qosmos ixEngine for ZTNA

Read more

Tags: Cloud Security , Cybersecurity , Deep Packet Inspection , Qosmos ixEngine , Traffic Intelligence , ZTNA

Enea Qosmos Technology for Visibility into Encrypted & Evasive Traffic

Enea Qosmos Technology for Visibility into Encrypted & Evasive Traffic

Read more

Tags: Cybersecurity , Deep Packet Inspection , Encryption , Qosmos ixEngine , Traffic Intelligence

MMS fingerprint

Dusting off Old Fingerprints: NSO Group’s Unknown MMS Hack

Read more

Tags: Cybersecurity , Mobile Security