Honeypots, the Hottest Thing in Intrusion Detection

 
 
By John Harrison  |  Posted 2003-11-04 Email Print this article Print
 
 
 
 
 
 
 

Decoy-based intrusion detection security can contain and control hacker attacks in ways IDS systems cannot. See how they can enhance your security practice.

Firewalls used to be considered sufficient protection for an organizations network. They are not anymore. The rapid growth of the Internet has provided hackers and other attackers with the ability to inflict major financial and public relations damage on an organization. Attackers are constantly developing new tools to exploit the applications necessary for an organization to maintain an Internet presence. As attackers develop more clever and imaginative methods to subvert or exploit the firewall, it has become apparent that advanced and layered security technologies are necessary to protect against hacker attacks. One such technology that has gathered considerable attention from industry analysts and trade media is decoy-based intrusion protection, also known as "honeypot" technology. Honeypots, considered by many as the hottest new intrusion protection technology, are used to contain and control an attack. They are used much like deception techniques in warfare that divert enemies into attacking false troops or airfields. These systems can be applied to defend networked assets from todays savvy attackers waging a new kind of war on the enterprise. Click here for the complete story...
 
 
 
 
John Harrison John Harrison is group product manager at Symantec, where he develops the company's network-based intrusion protection solutions. His responsibilities include Symantec Decoy Server, Symantec ManHunt, as well as the intrusion protection technology in Symantec Gateway Security, Symantec Client Security and Norton Internet Security.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel