Home > Network security software > Intrusion Detection Thursday, 3/23/2023
Network Administrator
Network Security
Exchange Server
ISA Server
Terminal Services
Internet Server
Comm. & collaboration
Microsoft server add-on
Other network Software


Submit your product
Advertise here

Featured Product
TechGenix Sites
The No.1 Forefront TMG / UAG and ISA Server resource site.
The leading Microsoft Exchange Server and Office 365 resource site.
Network Security & Information Security resource for IT administrators.
Windows Server 2012 / 2008 / 2003 & Windows 8 / 7 networking resource site.
The largest Windows Server focused newsletter worldwide.
The essential Virtualization resource site for administrators.
Cloud Computing Resource Site for IT Pros.
An independent Amazon Web Services resource site.
World's largest weekly newsletter on Windows Server and cloud technologies

ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.

Up one level   |   Submit your product

~ Intrusion Detection

Sort by   Rating Name Date
View by platform   Windows Linux Either Both
  Showing products 1-8 of 8  

Intrusion Detection and Defense System Rating:  (1 vote) - Vote
Last Updated: January 8, 2013 Reviews: 0 reviews - View / Submit
Cyberarms IDDS enhances Security by denying access to intruders on the network level. Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts. Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance to hackers!

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Price ::199
:: Company ::Cyberarms Limited - All Prods
:: Company URL ::cyberarms.net
:: Email ::maxemilian.hilbrand@cyberarms.net

Enterasys Dragon Host Sensor Rating:  (14 votes) - Vote
Last Updated: August 11, 2003 Reviews: 0 reviews - View / Submit
A host-based intrusion defense tool, Dragon Host Sensor monitors individual systems and applications, including today’s most common operating systems, for evidence of malicious or suspicious activity in real time, and monitors key system logs for evidence of tampering. Dragon Host Sensor may be deployed on a protected host or on a dedicated analysis system where logs are forwarded from switches, firewalls, routers and other IDSs and aggregated via SNMP or syslog. Dragon Host Sensor uses a variety of techniques to detect attacks and misuse on a protected system, including analyzing the security event log, checking the integrity of critical configuration files, or checking for kernel level compromises. This hybrid approach ensures that no misuse goes undetected.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Enterasys Networks, Inc. - All Prods
:: Company URL ::www.enterasys.com
:: Email ::sales@enterasys.com

KFSensor Rating:  (15 votes) - Vote
Last Updated: July 13, 2006 Reviews: 0 reviews - View / Submit
KFSensor is a Windows based honeypot Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and trojans. By acting as a decoy server it can divert attacks from critical systems and provide a higher level of information than can be achieved by using firewalls and NIDS alone.

KFSensor is designed for use in a Windows based corporate environment and contains many features such as remote management, a Snort compatible signature engine and emulations of Windows networking protocols. With its GUI based management console, documentation and low maintenance, KFSensor provides a cost effective way of improving an organization's network security.

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Price ::$990
:: Company ::KeyFocus Ltd. - All Prods
:: Company URL ::www.keyfocus.net
:: Email ::press@keyfocus.net

eTrust Intrusion Detection Rating:  (38 votes) - Vote
Last Updated: October 3, 2002 Reviews: 0 reviews - View / Submit
eTrust Intrusion Detection delivers network protection including but not limited to, defense against deployment and execution of Distributed Denial of Service (DDOS) attacks, malicious and unauthorized use of Internet facilities and other network misuse events. Provides realtime, non-intrusive detection, policy-based alerts, ad automatic prevention. Other protective capabilities include enforcing business-use policies through dynamic URL blocking and logging. Fully open and extensible, eTrust Intrusion Detection extends to other protection products such as proxies, routers and firewalls.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Computer Associates - All Prods
:: Company URL ::www.ca.com
:: Email ::cainfo@ca.com

GFI EventsManager Rating:  (209 votes) - Vote
Last Updated: November 8, 2012 Reviews: 0 reviews - View / Submit
GFI EventsManager is an award-winning events monitoring, management and archiving solution, that supports a wide range of event types such as W3C, Windows events, Sylogs and SNMP traps generated by devices such as firewalls, routers and sensors.

GFI EventsManager uses event processing and filtering technologies to identify key events out of the box. Advanced event processing rules allow you to filter out unwanted/trivial events and generate alerts on key issues. GFI EventsManager provides real-time alerting when critical events arise, suggests remedial actions and if applicable triggers corrective actions by automatically launching scripts and executable files. The built-in processing rules provided with the product, add significant value to its functionality aspects, because the information is very difficult to find and requires levels of expertise which are not necessary available to end users.

A free, fully functional, 30-day trial is available for download on our website.

TechGenix Reviews & Awards:

Mar '12

Mar '09

Mar '08

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Company ::GFI Software - All Prods
:: Company URL ::www.gfi.com
:: Email ::info@gfi.com

Intrusion Detection System Rating:  (0 votes) - Vote
Last Updated: December 9, 2010 Reviews: 0 reviews - View / Submit
Based on the award-winning Snort® rules-based detection engine, Sourcefire® provides best-in-class network intrusion detection with extensive analytics, powerful reporting, and unrivaled scalability. Through the use of Sourcefire 3D® Sensors and one or more Sourcefire Defense Center® management consoles, Sourcefire IPS deployed as an Intrusion Detection System uses a powerful combination of vulnerability- and anomaly-based inspection methods to detect attacks targeting thousands of vulnerabilities.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Sourcefire, Inc - All Prods
:: Company URL ::www.sourcefire.com
:: Email ::rmcdaniel@sourcefire.com

Snort Rating:  (0 votes) - Vote
Last Updated: July 1, 2005 Reviews: 0 reviews - View / Submit
Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages to Windows clients using Samba's smbclient.

:: Platform :: Linux
:: Product URL ::click here
:: Company ::Sourcefire - All Prods
:: Company URL ::www.sourcefire.com/
:: Email ::bmc@snort.org

CylantSecure for Linux Servers Rating:  (0 votes) - Vote
Last Updated: July 1, 2005 Reviews: 0 reviews - View / Submit
The Cylant technology models acceptable system execution patterns and detects precise deviations in real time - before damage and downtime can occur. It adaptively updates the system behavior models based upon continuous system observation and feedback. CylantSecure utilizes an analysis and control process to ensure that your enterprise is protected. Features include: Enable data collection; Model execution behavior; Monitor execution; Detect anomalies; Log, isolate, or stop anomalous behavior; Adapt to changes in behavior and policies

:: Platform :: Linux
:: Product URL ::click here
:: Company ::Cylant - All Prods
:: Company URL ::www.cylant.com
:: Email ::info@cylant.com

  Showing products 1-8 of 8  

Platform viewing legend 
  - Windows: All products that can run on Windows
- Linux: All Products that can run on Linux
- Either: All products
- Both: Products that can run on both Windows and Linux

Featured Links*