Intrusions to your network can easily occur at anytime and often come from unexpected sources. Intrusions from hackers, internet worms, viruses, Trojans, or just people curious about what you happen to have on your network pose great threat to the security of you network. Network Monitoring allows you to identify network weaknesses, as well as detect intrusions should they occur.
Intrusion detection really occurs in two phases: vulnerability detection and monitoring. First, you must identify the vulnerabilities or security weaknesses present in the network. The most common issues here are default or weak passwords, unprotected network services, un-patched buffer overflow or denial of service vulnerabilities, improper configurations, and excessive privileges granted to users. These are just some of the vulnerabilities that may allow intrusions to occur. Once you identify vulnerabilities, you can monitor to detect anyone attempting to exploit the vulnerabilities in an effort to compromise the network. Network Monitoring allows you to determine your organization's level of risk related to network intrusions, and then take significant steps to mitigate that risk by continuously monitoring for known attacks across the network.

Últimos artículos by Dirk Paessler

2016-Aug- 2: How to Grow and Stay Agile – Part 2: Top 6 Software Development Decisions

2016-Jun-14: How to Grow and Stay Agile – Part 1: Top 6 Business Decisions

2016-Jan-26: Critical Security Update Available for PRTG Network Monitor

2015-Jun- 2: Examples of IT Scenarios You Can Monitor with PRTG 100 for Free

2015-May- 5: Listen Up: What Our Customers Think About Mobile, Efficiency and Support Quality

2015-Apr- 7: Paessler Offers PRTG 100 for Free

2015-Feb- 4: How to Set up a Cloud Policy Before Entering the Cloud

2014-Jun-12: El Monitoreo de Cosas: Explorando un Nuevo Mundo de Datos

2014-May-29: How It All Started: 11 Years PRTG Network Monitor

2014-May-22: Monitoring of Things: Exploring a New World of Data

Copyright © 1998 - 2016 Paessler AG