ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Nokia on Sensor Placement



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

A network intrusion prevention solution typically consists of multiple sensors. Sensor placement within a network can greatly aid or hinder network security. As each enterprise operates differently, there is no single optimal approach.

Nokia Intrusion Prevention Solution consists of Sourcefire Intrusion Sensor for Nokia, Sourcefire Real-Time Network Awareness (RNA) Sensor for Nokia and Sourcefire Defense Center for Nokia. Intrusion and RNA Sensor location within a network directly affects the value of the information provided to the Defense Center.

Intrusion Sensors can either be deployed in Detection or Prevention modes.

Sensor placement decisions should take into account the usage of the sensors:

  • Attack Detection
  • Policy Enforcement
  • Surveillance
  • Network Problems

The correct placement of sensor is a key factor in ensuring a network's security. Different organizations have different networks and assets to protect. Understanding the organization's network and identifying the critical assets is the key to correct placement of the sensors.

Once the critical network segments and assets are determined it becomes crucial to place sensors on each of those network segments and close to the assets. This may mean investing in more sensors than planned leading to the ability to catch attacks and violations.