IDS mailing list archives

RE: Dragon/Enterasys


From: "list" <security () spectorsec com>
Date: Thu, 29 May 2003 21:57:42 -0400

I was lucky enough to have the privilege of receiving a personal
demonstration of the dragon IDS by Mr. Gula and I was very impressed
(this was back when it was still "network security wizards").  I used
the product for a number of months in not only a production environment
but also in a penetration testing lab with great success.  I
unfortunately have not had the pleasure of using the updated version so
I'm not much help on this front however of what I saw it was very
impressive and thorough.  There are however alternatives that may be
superior.

-----Original Message-----
From: Briney, Andrew [mailto:abriney () infosecuritymag com] 
Sent: Wednesday, May 28, 2003 12:38 PM
To: 'focus-ids () securityfocus com'
Subject: Dragon/Enterasys

-----BEGIN PGP SIGNED MESSAGE-----

Hi folks:

Information Security magazine is preparing an article that will
discuss, in part, the Dragon IDS. We'd like to talk to former/current
Dragon users about their impression of Dragon vis other IDSes, and
whether there's been any "change" since Gula left Enterasys, good or
bad. 

If you're interested, please contact me offline. Thanks!
_______________________________
Andrew Briney, CISSP
Editor-in-Chief, Information Security Magazine 
85 Astor Ave, Ste. 2, Norwood, MA 02445
781-255-0200 x.13 FAX 781-255-0215
http://www.infosecuritymag.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQEVAwUBPtTl3KsbyO6uMElTAQGTQwf+Lzl0Cm/klPC0ZnAwC9ll3u/Mo/3D4RAw
nluftzWt6GGwhmM/9qdLpADtPZpAI+p/x9UGSw+ZFNl1w+nDQqKkRFPi3MEo+uDl
nhaBgXArUyfXrypwp42svQVINwnwS5mOiFkm/6vWzMk6Yk7gGX02qN/e4Gkd7A0S
2RB5wk/Xf2nt1c2HGJdCcRQKVwAns8Ig0Coqjnug17mli6n/GaICKee9MvrW9YlN
0hAdqKH2hbwqlEuKkCNqVu+5AstkmbIO8xx5NcUIGmnaW0DmGVdqA47R04VdxmV3
jmRe7dhwVgK+H31Or2OiwwrOuqo5lnqmpnSUKw11S9Scp+3RM/vp4Q==
=BW50
-----END PGP SIGNATURE-----

***********************************************************************
This message is intended only for the use of the intended recipient and
may contain information that is PRIVILEGED and/or CONFIDENTIAL.  If you
are not the intended recipient, you are hereby notified that any use,
dissemination, disclosure or copying of this communication is strictly
prohibited.  If you have received this communication in error, please
destroy all copies of this message and its attachments and notify us
immediately.
***********************************************************************


------------------------------------------------------------------------
-------
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM
capabilities 
- including intrusion identification, relevancy, direction, impact and
analysis 
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths,
Challenges, and Requirements" at: 
http://www.securityfocus.com/IntruVert-focus-ids2
------------------------------------------------------------------------
-------


-------------------------------------------------------------------------------
INTRUSION PREVENTION: READY FOR PRIME TIME?

IntruShield now offers unprecedented Intrusion IntelligenceTM capabilities 
- including intrusion identification, relevancy, direction, impact and analysis 
- enabling a path to prevention.

Download the latest white paper "Intrusion Prevention: Myths, Challenges, and Requirements" at: 
http://www.securityfocus.com/IntruVert-focus-ids2
-------------------------------------------------------------------------------


Current thread: