IDS mailing list archives
RE: Dragon/Enterasys
From: "list" <security () spectorsec com>
Date: Thu, 29 May 2003 21:57:42 -0400
I was lucky enough to have the privilege of receiving a personal demonstration of the dragon IDS by Mr. Gula and I was very impressed (this was back when it was still "network security wizards"). I used the product for a number of months in not only a production environment but also in a penetration testing lab with great success. I unfortunately have not had the pleasure of using the updated version so I'm not much help on this front however of what I saw it was very impressive and thorough. There are however alternatives that may be superior. -----Original Message----- From: Briney, Andrew [mailto:abriney () infosecuritymag com] Sent: Wednesday, May 28, 2003 12:38 PM To: 'focus-ids () securityfocus com' Subject: Dragon/Enterasys -----BEGIN PGP SIGNED MESSAGE----- Hi folks: Information Security magazine is preparing an article that will discuss, in part, the Dragon IDS. We'd like to talk to former/current Dragon users about their impression of Dragon vis other IDSes, and whether there's been any "change" since Gula left Enterasys, good or bad. If you're interested, please contact me offline. Thanks! _______________________________ Andrew Briney, CISSP Editor-in-Chief, Information Security Magazine 85 Astor Ave, Ste. 2, Norwood, MA 02445 781-255-0200 x.13 FAX 781-255-0215 http://www.infosecuritymag.com -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.1 iQEVAwUBPtTl3KsbyO6uMElTAQGTQwf+Lzl0Cm/klPC0ZnAwC9ll3u/Mo/3D4RAw nluftzWt6GGwhmM/9qdLpADtPZpAI+p/x9UGSw+ZFNl1w+nDQqKkRFPi3MEo+uDl nhaBgXArUyfXrypwp42svQVINwnwS5mOiFkm/6vWzMk6Yk7gGX02qN/e4Gkd7A0S 2RB5wk/Xf2nt1c2HGJdCcRQKVwAns8Ig0Coqjnug17mli6n/GaICKee9MvrW9YlN 0hAdqKH2hbwqlEuKkCNqVu+5AstkmbIO8xx5NcUIGmnaW0DmGVdqA47R04VdxmV3 jmRe7dhwVgK+H31Or2OiwwrOuqo5lnqmpnSUKw11S9Scp+3RM/vp4Q== =BW50 -----END PGP SIGNATURE----- *********************************************************************** This message is intended only for the use of the intended recipient and may contain information that is PRIVILEGED and/or CONFIDENTIAL. If you are not the intended recipient, you are hereby notified that any use, dissemination, disclosure or copying of this communication is strictly prohibited. If you have received this communication in error, please destroy all copies of this message and its attachments and notify us immediately. *********************************************************************** ------------------------------------------------------------------------ ------- INTRUSION PREVENTION: READY FOR PRIME TIME? IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities - including intrusion identification, relevancy, direction, impact and analysis - enabling a path to prevention. Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: http://www.securityfocus.com/IntruVert-focus-ids2 ------------------------------------------------------------------------ ------- ------------------------------------------------------------------------------- INTRUSION PREVENTION: READY FOR PRIME TIME? IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities - including intrusion identification, relevancy, direction, impact and analysis - enabling a path to prevention. Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: http://www.securityfocus.com/IntruVert-focus-ids2 -------------------------------------------------------------------------------
Current thread:
- Dragon/Enterasys Briney, Andrew (May 28)
- RE: Dragon/Enterasys list (May 29)