Server centric intrusion detection is critical and augments network intrusion detection systems. In Laura's Corner we answer questions being posed by clients in these areas.
Our last email blast generated many questions from our valued readers. We have selected several representative of those received to answer at this time.
Realizing these risks, IBM introduced the z14 focused on further enhancing security. While the new encryption support of the z14 is a highlight of this new processor, exploiting IDS will bring significant protections to all z systems. The business benefit IDS provides is reducing the chance of missing security threats which could compromise confidentiality, integrity, privacy, or availability of mission critical assets and processes.
The Blockchain is a secure transaction ledger database that is shared by all parties participating in an established, distributed network of peer-peer computers. It records and stores every transaction that occurs in the network, essentially eliminating the need for "trusted" third parties such as payment processors. Entities participating in a transaction are not necessarily known to each other yet they exchange value with confidence and no third-party validation. For this reason, Blockchain is a potential game changer.
If you are going to adopt microservices, you also have to understand that microservice architectures have many moving parts, a high rate of change, short lifetimes, and complex endto- end request flows. When it comes to management, this presents an important difference between microservices and monolithic architectures. More moving parts mean more complexity to monitor and manage in order to keep applications and infrastructure healthy and running.
Let's focus on Intrusion Detection Systems (IDS), which many leave to the infrastructure team. Infrastructure or network base IDS focuses on passive monitoring of packets flowing in all directions and alerts based on real time activity. Server based IDS is very different. Residing on the server, it monitors several types of changes over time which may indicate security problems. IDS monitors the dynamic behavior and the state of a computer system and compares what it expects to see with what it actually sees.