Networking's greatest debates in Security

Classic debates include Immediate flaw alerts vs. Disclosing with patches, IDS vs. IPS and Perimeter security vs. inside security

IDS vs. IPS

A firestorm of controversy exploded four years ago when consulting firm Gartner declared that intrusion-detection systems that passively monitor for malicious traffic would be "dead" by 2005, a dinosaur wiped out by intrusion-prevention systems that proactively block bad traffic.

Buying an IDS to monitor unwanted traffic is a waste of time and money, Gartner stated, urging enterprise managers to start buying in-line IPS products and step up to the plate and block the attack traffic comin' at 'em, primarily from the Internet.

Blocking the bad traffic with an in-line IPS opened the possibility of mistakenly blocking good traffic, too, yelped IDS proponents.

IPS products in 2003 were mainly in their infancy and their accuracy deeply suspect. IDS - the most well-known and popular being open source Snort created by Martin Roesch in 1998 - was a known quantity. Sure, IDS had its drawbacks, sometimes generated false positive and negatives, and most people didn't really know what to do with the massive amount of information netted in the monitoring process.

But Gartner saying IDS is dead?

"I find the logic behind their conclusions significantly flawed and their recommendations incomprehensible," was the response at the time from Roesch, CTO at Sourcefire, founded in 2001 to commercialize Snort. "To be fair, Gartner's concerns have some basis in fact," he conceded, adding, "Undoubtedly, IDS must continue to evolve in order to fully realize its potential."

Today, the issue is largely a moot point as IPS products on the market - which typically rely on IDS detection techniques to flag a problem - tend to operate in a mixed mode, allowing managers to boldly block malicious traffic or passively monitor, or both, depending on the configuration. Security vendors are often coy about breaking out figures on IDS and IPS, but IDC believes IPS began overtaking IDS in 2005. Continuous testing by independent sources helps with determining strengths and weaknesses in IPS. -Ellen Messmer

IPSec vs. SSL VPNs

When IP VPNs came on the scene in the late 1990s IPSec quickly established itself as the standard to provide secure network-layer connectivity over insecure IP networks, typically the Internet.

The appeal was obvious: it is less expensive to buy Internet access and make WAN connections over it than to buy dedicated circuits or a frame relay or MPLS service.

But IPSec is complex. The more sites that connect to each other, the more secure links or tunnels need to be defined and maintained. If IPSec is used for remote access, it requires software on every remote machine that must be installed and maintained.

Then SSL VPNs entered the scene offering application-layer secure access over the Internet using capabilities common to most browsers. The implication was that businesses interested in remote-access VPNs no longer needed to distribute and maintain client software on the remote machines.

The limitation of SSL was that the browsers could access only Web-based applications, but this challenge was met by Webifying non-Web applications or pushing Java or Active X SSL VPN agents to the remote machines on the fly. These plug-ins gave the remote computers the ability to create network layer connections comparable to IPSec, but without having to distribute dedicated VPN client software.

As a result, SSL VPNs are making great headway against IPSec VPNs for remote access and seem likely to win out in the end.

IPSec is still the preferred method of site-to-site VPNs because either technology requires a gateway anyway, IPSec is better established in this arena and many SSL vendors don't even offer site-to-site connections. For site-to-site, IPSec carries the day.

-Tim Greene

Join the PC World newsletter!

Error: Please check your email address.

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Staff Writers

Network World

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?