<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS/IDS Effectiveness? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26678#M19488</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palo Alto Networks has been very successful replacing standalone IPS/ &lt;BR /&gt;&amp;gt; IDS systems in some very large organizations for a few key reasons:&lt;/P&gt;&lt;P&gt;&amp;gt; 1)&amp;nbsp; We have very good vulnerability signatures written by a top- &lt;BR /&gt;&amp;gt; notch security team.&amp;nbsp; We write all of our own signatures (we don't&amp;nbsp; &lt;BR /&gt;&amp;gt; outsource like most IPS companies) and we're part of Microsoft's&amp;nbsp; &lt;BR /&gt;&amp;gt; MAPP program (as well as one of the top contributors to Microsoft).&lt;BR /&gt;&amp;gt; 2)&amp;nbsp; We not only identify vulnerability exploits, but we can identify&amp;nbsp; &lt;BR /&gt;&amp;gt; nearly 1,000 applications.&amp;nbsp; This is critical even in a datacenter&amp;nbsp; &lt;BR /&gt;&amp;gt; where we've seen misconfigured applications (HTTP apps running on&amp;nbsp; &lt;BR /&gt;&amp;gt; port 443), disallowed applications like RDP running for convenience&amp;nbsp; &lt;BR /&gt;&amp;gt; purposes, or SSH relays to tunnel applications in/out of networks&amp;nbsp; &lt;BR /&gt;&amp;gt; while bypassing filtering.&lt;BR /&gt;&amp;gt; 3)&amp;nbsp; Our systems run at very high speeds - up to 10Gbps FW with 5Gpbs&amp;nbsp; &lt;BR /&gt;&amp;gt; threat prevention with very low latency.&lt;BR /&gt;&amp;gt; 4)&amp;nbsp; We are unique in the field in that we are able to perform SSL inbound and outbound decryption which can &lt;BR /&gt;&amp;gt; which can protect both servers and clients&lt;BR /&gt;&amp;gt; 5)&amp;nbsp; The platforms are very well priced in comparison to standalone&amp;nbsp; &lt;BR /&gt;&amp;gt; IPS systems.&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; We have many large enterprise customers who have replaced&amp;nbsp; &lt;BR /&gt;&amp;gt; SourceFire, ISS, Juniper, McAfee, TippingPoint and others with us.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Apr 2010 22:34:26 GMT</pubDate>
    <dc:creator>nrice</dc:creator>
    <dc:date>2010-04-27T22:34:26Z</dc:date>
    <item>
      <title>IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26677#M19487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know this is subjective, but does anyone have any knowledge/experience of how effective the Palo Alto IPS/IDS is compared to a more dedicated product?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking at ways to try and detect/block suspect traffic to our web server and obviously there are lots of IPS/IDS solutions ranging from software to hardware.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Apr 2010 19:41:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26677#M19487</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2010-04-22T19:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26678#M19488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palo Alto Networks has been very successful replacing standalone IPS/ &lt;BR /&gt;&amp;gt; IDS systems in some very large organizations for a few key reasons:&lt;/P&gt;&lt;P&gt;&amp;gt; 1)&amp;nbsp; We have very good vulnerability signatures written by a top- &lt;BR /&gt;&amp;gt; notch security team.&amp;nbsp; We write all of our own signatures (we don't&amp;nbsp; &lt;BR /&gt;&amp;gt; outsource like most IPS companies) and we're part of Microsoft's&amp;nbsp; &lt;BR /&gt;&amp;gt; MAPP program (as well as one of the top contributors to Microsoft).&lt;BR /&gt;&amp;gt; 2)&amp;nbsp; We not only identify vulnerability exploits, but we can identify&amp;nbsp; &lt;BR /&gt;&amp;gt; nearly 1,000 applications.&amp;nbsp; This is critical even in a datacenter&amp;nbsp; &lt;BR /&gt;&amp;gt; where we've seen misconfigured applications (HTTP apps running on&amp;nbsp; &lt;BR /&gt;&amp;gt; port 443), disallowed applications like RDP running for convenience&amp;nbsp; &lt;BR /&gt;&amp;gt; purposes, or SSH relays to tunnel applications in/out of networks&amp;nbsp; &lt;BR /&gt;&amp;gt; while bypassing filtering.&lt;BR /&gt;&amp;gt; 3)&amp;nbsp; Our systems run at very high speeds - up to 10Gbps FW with 5Gpbs&amp;nbsp; &lt;BR /&gt;&amp;gt; threat prevention with very low latency.&lt;BR /&gt;&amp;gt; 4)&amp;nbsp; We are unique in the field in that we are able to perform SSL inbound and outbound decryption which can &lt;BR /&gt;&amp;gt; which can protect both servers and clients&lt;BR /&gt;&amp;gt; 5)&amp;nbsp; The platforms are very well priced in comparison to standalone&amp;nbsp; &lt;BR /&gt;&amp;gt; IPS systems.&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; We have many large enterprise customers who have replaced&amp;nbsp; &lt;BR /&gt;&amp;gt; SourceFire, ISS, Juniper, McAfee, TippingPoint and others with us.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 22:34:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26678#M19488</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2010-04-27T22:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26679#M19489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you share information about latency time and paloalto capable to protect zeroa day attack?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;nForce &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 01:10:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26679#M19489</guid>
      <dc:creator>Mark-Nakrop</dc:creator>
      <dc:date>2010-10-02T01:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26680#M19490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;First, I appreciate your asking the question. It'd be normal to expect that standalone products would be better than multi-functional products. In the case of IPS however, reality trumps intuition. NSS, an independent third-party IPS certification organization, did a group test of standalone IPSes last year and the best IPS blocked roughly 89% of the attacks and that too very likely at a lower performance level (versus claimed) refer to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://nsslabs.com/IPS-2009-Q4"&gt;http://nsslabs.com/IPS-2009-Q4&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; The performance graph indicates that IPSes with &amp;gt; 1Gbps threat prevention had their performance &lt;/SPAN&gt;&lt;EM&gt;reduced&lt;/EM&gt; by roughly 15-20% while running a &lt;EM&gt;tuned&lt;/EM&gt; configuration (i.e, a configuration with all signatures turned on; typically IPSes quote performance numbers with only certain signatures turned on as the performance usually drops with all signatures turned on). Palo Alto Network's PA-4020 was tested recently by NSS and we blocked 93.4% of attacks at 115% of stated performance while running a tuned configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PA-4020&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Best Standalone IPS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e.,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security Effectiveness&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 93.4%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ~89%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Throughput&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 115%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ~85%&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our high security effectiveness reflects the quality of our IPS signatures and better than stated performance reflects our high-performance architecture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any further questions,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 08:10:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26680#M19490</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-02T08:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26681#M19491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, we do provide coverage for zero-day attacks (these are the attacks for which vulnerability/exploit is made known to the public without the patch from vendor).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Sandeep &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Oct 2010 08:11:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26681#M19491</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2010-10-02T08:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/IDS Effectiveness?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26682#M19492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Question about the Threat Prevention capabilities:&lt;/P&gt;&lt;P&gt;what is the total amount of signature filters at the moment?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jan 2012 10:22:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ips-ids-effectiveness/m-p/26682#M19492</guid>
      <dc:creator>Peter_van_Roode</dc:creator>
      <dc:date>2012-01-13T10:22:07Z</dc:date>
    </item>
  </channel>
</rss>

