Report

Industry Report

Intrusion Detection & Prevention Systems (IDS/IPS)

Why Do IDS/IPS Solutions Need to Evolve to Stay Effective?

A comprehensive survey of network security professionals recently conducted by Cybersecurity Insiders reveals that Intrusion Detection and Prevention Systems (IDS/IPS) continue to be one of the most widely deployed security tools in the world. However, respondents also raised serious concerns about IDS/IPS’ ability to detect and protect against the most advanced threats.

The report presents the results of this new survey. Key findings include:

  • 45% of respondents consider inaccurate, noisy alerts as their biggest headache
  • 51% of respondents want their IDS/IPS to improve detection of anomalous and evasive traffic
  • 64% of respondents require expanded IDS/IPS protocol and application coverage for cloud-based business apps (Salesforce, Office 365, etc.)
  • 23% of respondents need better traffic visibility in encrypted environments

Security practitioners will find the report useful in evaluating their own cybersecurity strategies, and IDS/IPS developers will be able to align product roadmaps with evolving user needs and concerns.

Related insights

Extreme Networks Chooses Enea DPI Software for the Extreme SD-WAN

Why Extreme Networks Chose Enea’s DPI Software for ExtremeCloud SD-WAN

Read more

Tags: Cybersecurity, ExtremeNetworks, network, SDWAN

Get Ready for Post-Quantum Cryptography with Enea Qosmos Technology, Part 2 of 2

Read more

Tags: AI, Cybersecurity, Deep Packet Inspection

Get Ready for Post-Quantum Cryptography with Enea Qosmos Technology, Part 1 of 2

Read more

Tags: AI, Cybersecurity, Deep Packet Inspection

TLS 1.3 ECH - Encryption - How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

TLS 1.3 ECH – How to Preserve Critical Traffic Visibility for Enterprise and Network Security while Safeguarding Privacy

Read more

Tags: Cybersecurity, Deep Packet Inspection, Encryption, SASE, SD-WAN, Threat Detection, ZTNA

How Custocy Uses DPI and IDS to Power AI-Based NDR

AI & the Network Edge: Challenges, Solutions & Best Practices for Network Security

Read more

Tags: AI, Cybersecurity, Deep Packet Inspection, DPI, Edge, Network Security, Threat Detection