Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Select and Implement an Intrusion Detection and Prevention System

Vendor Evaluation

  • Threats are evolving every day, and are unforeseeable and diverse. Protecting information has become less about technology and more about contributing to sustainability of your organization as a whole.
  • Advanced Persistent Threats (APTs) and Zero-Day attacks are taking organizations by surprise, and Intrusion Prevention Systems (IPS) have had to adapt to the playing field by adding features to address these threats.
  • The marketspace of Intrusion Detection and Prevention System (IDPS) solutions has many options, but identifying the right product with the right features for your organization can be complicated. As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating.

Our Advice

Critical Insight

  • Differentiation comes with costs. Most IDPS solutions offer similar features, so the real decision comes down to cost – which varies depending on where you’re putting sensors. It can be a significant investment.
  • Integration for ease of management. Reflective of the overall security space, IDPS integrating with SIEM, NAC, and firewalls means more consolidation, more visibility into network activity, and more security for organizations.
  • Signature analysis growing stagnant. Features-wise, solutions are starting to expand on traditional signature analysis to include heuristics and behavioral analysis to identify more unknown attacks.

Impact and Result

  • Prepare to implement IDPS by understanding your organizational (resources, etc.) and architectural (data centers, PCI-DSS zones, etc.) requirements.
  • Understand top competitors in the space and how they can meet your specific requirements in terms of features.
  • Ready your team for deployment and incident response, creating metrics to measure improvement and eventually demonstrate value.

Select and Implement an Intrusion Detection and Prevention System Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should select and implement an intrusion detection and prevention system, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

1. Launch the IDPS project

Assess the value and identify the organization’s fit for IDPS technology, and structure the IDPS selection project.

4. Plan the IDPS implementation

Plan the IDPS implementation and measure the value of the IDPS solution.

Vendor Evaluation

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 3-phase advisory process. You'll receive 7 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Launch IDPS selection project
  • Call 1: Identify your fit for IDPS.
  • Call 2: Identify staffing needs for your IDPS selection project.

Guided Implementation 2: Analyze requirements & shortlist vendors
  • Call 1: Review requirements gathering findings.
  • Call 2: Discuss Vendor Landscape.

Guided Implementation 3: Select IDPS solution
  • Call 1: Create your procurement strategy.
  • Call 2: Discuss evaluation results.
  • Call 3: Conduct a contract review.

Authors

Jessica Ireland

Celine Gravelines

Search Code: 73757
Last Revised: May 22, 2015

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019