Two Sides of Vulnerability Scanning
Source: ComputerWorld.com - Posted by Benjamin D. Thomas   
Network Security There are two approaches to network vulnerability scanning, active and passive. The active approach encompasses everything an organization does to foil system breaches, while the passive (or monitoring) approach entails all the ways the organization oversees system security. When making buying decisions for your organization, it's a mistake to think that you have to choose between the two types of protection.

Guardian Digital's flagship operating platform, EnGarde Secure Linux, is another example of a passive security tool with intrusion-detection capabilities to assist users in pinpointing security threats. Guardian also offers the Internet Defense and Detection System, which the company claims is the first open-source IDS application to provide both enhanced intrusion-detection and -prevention capabilities in one system.

Read this full article at ComputerWorld.com

Only registered users can write comments.
Please login or register.

Powered by AkoComment!