This white paper analyzes traditional and new approaches to intrusion detection, and how they apply to today’s most advanced cyber attacks. It also covers:

  • The evolution and de-evolution of IDS
  • How IDS holds up against modern threats
  • The science behind new models of threat detection
  • Applying intelligence to all phases of an attack

thumb-WP-IDS-052118