Open Source
ACID (Analysis Console for Intrusion Databases), Advanced Intrusion Detection Environment, Chkrootkit, Firestorm Network Intrusion Detection System, Honeyd, Idsa, LAk Intrusion Prevention System, LIDS Project - Secure Linux System, myNetWatchman.com, Open-Source IDS
Activeworx, Inc.
Manufacturer of Activeworx Security Center, a feature-rich security event management solution to handle enterprise network events. A centralized and distributed framework facilitates event management, event correlation, reporting and detailed forensic analysis.
Barbedwire Technologies
Manufacturer of multi-purpose hardware security appliances that provide IDS capabilities. Features include SSL-based management console, single or multi platform deployment, pre-installed sensors and detection signatures, and aggregation of reports from multiple sensors.
Blue Lance LT Auditor+
LT Auditor+ enables administrators to track network activity and alerts users about intrusions through email or paging.
Cisco Systems IDS
The Cisco Secure Intrusion Detection System is an enterprise-scale, real-time, system designed to detect, report, and terminate unauthorized activity throughout a network.
Countersnipe
Provisioner of IT security products with a focus on active protection of corporate infrastructures. Products include 1U, 2U and 4U rack-mountable intrusion detection/prevention systems.
Critical Test Access Points
Developer of TAP (Test Access Point) devices designed to give Intrusion Detection Systems the ability to view both sides of a full duplex conversation, reduce packet loss due to network hardware, and view all transmitted packets.
CyberSafe
Software publisher specializing in the development and implementation of network security solutions, including the Centrax Intrusion Detection System.
CyberTrace Intrusion Detection
CyberTrace is an active network monitoring tool that identifies suspecious network traffic. Features include the ability to flags connections by priority and review/replay traffic sessions.
Cymtec Systems
Manufacturer of Cymtec Scout, a Snort-based intrusion detection and prevention appliance.
Demarc Security
Manufacturer of hardware IDS appliances, including Sentarus, which detects network and host based intrusion attacks, prevents future attacks, and maintains overall stability.
DigiStamp: e-TimeStamp Secure Time Stamps
Commercial time-stamping service that provides intellectual property witnessing and document authentication for any file on a system. Service intends to provide digital evidence that data has not been altered or backdated. Recognizes IETF Standard RFC-3161 (Time Stamp Authority).
Easy Guard Intrusion Alert
Manufacturer of the Easy Guard suite of Internet security solutions, including firewall and intrusion detection products.
eCom Corporation
Manufacturer of eSCAN, a tool designed to remotely evaluate a network from a remote location and regularly provide detailed security audit reports.
EiP Distribution
Distributor of Internet security systems for intrusion detection and prevention, anti-virus, SSL VPN, enterprise risk management and vulnerability assessments.
Enterasys Intrusion Detection
Host and network-based IDS appliance designed to meet the security requirements of the enterprise environment. Support for Windows, Linux, Solaris, AIX, and HPUX.
eTrust Intrusion Detection
eTrust is Computer Associates solution intended to incorporate a comprehensive network intrusion management and prevention system, real-time session monitoring, and Internet web filtering.
EventTracker
A proactive enterprise-class tool to centrally monitor, analyze and manage events being emitted by Windows NT/2K/XP/2003, UNIX systems and SNMP-enabled devices.
Firewalls Direct
Certified Netscreen Intrusion Detection & Prevention and Firewall Reseller.
Internet Security Systems
A comprehensive host based security assessment and intrusion detection tool, S2 identifies and reports exploitable system weaknesses.
Intruder Alert
Comprehensive enterprise security monitoring that will detect and respond to attacks in real-time.
IntruLock Security Solution
IntruLock is a commercial application that attempts to consolidate all security and system monitoring tasks in one common easy to use environment. Current integration includes Snort, Cisco IOS, OpenBSD pf, FreeBSD ipfw, and Linux iptables. Also available as a freeware version, IntruLock Lite.
Intrusion, Inc.
The maker of SecureNet Pro, a commercial Network Intrusion Detection (NIDS) product suite.
ipANGEL Adaptive IDS/IPS
ipANGEL integrates vulnerability assessment and intrusion detection/prevention technologies, creating a new type of solution that is aware of its environment, and modifies the security posture accordingly.
Joret Software
Vendor of "Security Detective" suite, an application that helps auditors and system administrators protect critical information assets by quickly identifying potential security exposures. Investigate Windows NT, UNIX, OS/400 and VMS security from one central PC.
KeyFocus - KF Sensor - Honey pot IDS
KFSensor is a host based Intrusion Detection System (IDS). It acts as a honey pot to attract and detect hackers by simulating vulnerable system services and trojans.
Lancope
Features a dynamic threat management system that monitors security breaches and internal misuse without relying on attack signatures.
LANguard
Intrusion detection, content filtering, security scanner, Internet access control, network security, Internet monitoring.
Manda Technologies
Manufacturer of In-Clusive, an intranet protection and Corporate Governance system intended to prevent data theft and to detect abnormal behavior.
Melior Incorporated
Vendor of iSecure, an Intrusion Prevention System (IPS) offering protection against distributed denial-of-service attacks (DDoS) and infrastructure cloaking capabilities.
Neogenesys
Offers multiplatform security secure, detect, and audit. (AS/400, Unix, Linux and Windows NT/2000)
Network Chemistry
Developer of wireless-centric enterprise class monitoring and analysis tools intended to improve the security and performance of their wireless LANs.
Network Flight Recorder
"Clue-Gathering Tools for Network and Security Managers" from which an IDS can be built. Source code freely available.
Next Generation Security Technologies
NGSEC is a security company with two main focuses: ngProducts (set of security solutions ranging firewalls, and IDS) and ngServices (penetration tests, source code auditing, software and development).
NIKSUN Inc.
NIKSUN is the recognized worldwide leader in developing and deploying a complete range of network performance monitoring, security surveillance and forensic analysis tools serving a wide range of protocols and interfaces, ranging from Ethernet and Gigabit Ethernet to OC-3. Our products are the only network appliances that continuously capture and analyze LAN, MAN and WAN traffic at Gigabit rates in a single platform.
Nitro Data Systems Inc.
Suppliers of NitroGuard, the intrusion prevention device based on their open source HogWash software. Unlike intrusion detection, it is used to prevent intrusion.
Nokia Intrusion Detection
Learn about Nokia's network security appliance featuring the RealSecure intrusion-detection engine.
OTO Software Wireless Watch
Wireless Watch is an application that constantly scans a home wireless network for activity from any unauthorized or unknown network devices.
PacketAlarm
Real-time network sensor-based Intrusion Detection System (IDS). Based on snort, features include live signature updates and custom signature creation.
Paldion Networks
Information security specialists providing penetration testing, vulnerability assessment, application security audit and intrusion detection implementation services
Parador File Protection
A Windows-based intrusion and anomaly detection tool that will complement signature-based applications such as virus scanners. Allows for the use of automatic rules updates, policy templates, learning modes, and more.
PENS Dragon IDS
The PENS Dragon Intrusion Detection System.
Privacyware ThreatSentry
Monitoring application designed for Microsoft Internet Information Services (IIS) which detects suspicious activity by comparing against an evolving baseline of normal activity.
Psynapse Technologies
Offers the checkmate intrusion detection software and network security consulting.
QJRN/400
QJRN/400 is a system and database audit solution intended to audit and secure IBM OS/400 servers. Functionality includes access control and detailed monitoring of system events.
Safety-Lab
Provider of security scanners, and web analyzers for network maintenance, also consulting and vulnerability testing.
SECUREDwire
Manufacturer of Network Scout, a behavior-based perimeter intrusion preventation system.
Securicore
Manufacturers of SecoShield, an OPSEC-certified multi-sensor IDS available as a nIDS appliance or as software only. Protection is based on signature, policy, anomaly and re-analysis.
SecurityMetrics
Manufacturer of Intrusion Detection/Prevention appliances. Features include Layer 2 network bridge operation, an integrated hardware/software solution, and automatic attack signature updating.
sentryware
Manufacturer of server security products intended to safeguard HTTP transactions, identify and protect against web server vulnerabilities.
Snort 2.0 Intrusion Detection
The first book dealing with the Snort IDS, written by a member of snort.org., offers insight into the code base, tutorials, configuration and troubleshooting scenarios.
SPECTER Intrusion Detection System
Official site of the SPECTER intrusion detection system.
ThreatSentry
ThreatSentry compares system requests against an evolving system baseline to detect untrusted activity and prevent known, undocumented and other misuse for Microsoft IIS webservers.
TippingPoint Technologies
Develops multi-gigabit, multi-zone, auto-adapting network-defense systems that deliver threat assessment, detection and prevention.
Top Layer Networks
Manufacturer of network IPS (Intrusion Prevention Systems) hardware. ASIC-designed devices help prevent attacks such as distributed denial of service, flood, HTTP URI and SYN attacks for high-traffic networks.
TriGeo Network Security, Inc.
TriGeo Network Security, Inc., is a software development and services firm providing network security services and an overlay software solution that centralizes and enhances existing third party network security tools to protect against internal and external attacks.
Tripwire, Inc
Data integrity system that detects unauthorized changes to data on servers and routers and sends notifications. Immediate remediation of altered data is possible.
TruSecure Corporation
Risk mitigation for complex and interconnected business environments. Provider of managed security, risk reduction, and software solutions to prevent network intrusion.
UAC Intrusion Alert
Unified Access Communications has developed a Linux-based intrusion detection system with an easy to use graphical interface.
Verano Industrial Defender
A multi-layered security system designed to protect mission-critical control systems. Incorporates NIDS, HIDS, perimeter security, virus protection and performance monitoring.
Wireless LAN Monitoring & Intrusion Protection
WiMetrics' solutions provide a real-time view of all 802.11 wireless device activity on the wireless LAN. Locate rogue wireless access points without using a wireless sniffer device. Authorize 802.11 devices for trusted network access and automatically block intruders from gaining access to the wired LAN.
Wireless LAN Security Intrusion Detection and Moni
Industry-First Wireless LAN Intrusion Detection and Protection 24x7 real-time monitoring of 802.11 WLANs. Integrates multi-dimensional intrusion detection with stateful monitoring to effectively secure WLANs from intruders, hackers, interference and network abuses
xDefenders, Inc.
Provider of managed security services, including the netDefender Intrusion Detection System.
Xintegrity
Product monitors for changes to Windows files, allowing for detection of unauthorized changes, as well as optional automated backup of files as they are changed.
Zion Network Security
Network IDS/IPS appliance that intends to dynamically recognize and respond to active network attacks.