Intrusions to your network can easily occur at anytime and often come from unexpected sources. Intrusions from hackers, internet worms, viruses, Trojans, or just people curious about what you happen to have on your network pose great threat to the security of you network. Network Monitoring allows you to identify network weaknesses, as well as detect intrusions should they occur.
Intrusion detection really occurs in two phases: vulnerability detection and monitoring. First, you must identify the vulnerabilities or security weaknesses present in the network. The most common issues here are default or weak passwords, unprotected network services, un-patched buffer overflow or denial of service vulnerabilities, improper configurations, and excessive privileges granted to users. These are just some of the vulnerabilities that may allow intrusions to occur. Once you identify vulnerabilities, you can monitor to detect anyone attempting to exploit the vulnerabilities in an effort to compromise the network. Network Monitoring allows you to determine your organization's level of risk related to network intrusions, and then take significant steps to mitigate that risk by continuously monitoring for known attacks across the network.

Neuste Blog-Beiträge von Dirk Paessler

2014-Apr- 8: OpenSSL Heartbleed Bug Vulnerability

2014-Mar- 5: The Future is Mobile: Are You Ready?

2014-Feb-27: Die Zukunft der Netzwerküberwachung ist mobil und virtuell

2014-Feb-25: Critical Security Update Available for PRTG Network Monitor

2013-Jul-16: Introducing Our New Passive Application Performance Sensor

2013-Apr-23: Paessler at VMware Forum 2013

2012-Nov- 7: New Version of PRTG Introduces 64bit Core Server and Other New Features

2012-Jul-13: The WMI Performance Test (2012 Edition)

2012-Jul-10: The Paessler Roadmap

2012-Jul- 3: How We Rate Your Feature Requests

Copyright © 1998 - 2014 Paessler AG