Jason Harper


Jason Harper is a senior security engineer for a global company. He works on the policies and procedures that support network security technology.

Deploy Your Network IDS Effectively 2
Where you place your network Intrusion Detection System (IDS) sensors and how you manage the information they provide are crucial factors in how well the IDS protects your network.
Placing Your Controls
When you create ACLs or filters, you must tell the router when to apply them. You’ll want to place them so that your system uses router processing cycles efficiently.
Protect Your Network from Intrusion
A properly placed network IDS, such as Snort, is an important component of your defense-in-depth approach to network security.
IDS Signature Analysis
In signature analysis, the sensor looks not only at the header information, flags set, and packet shape, but also at the contents of the datagram-typically referred to as the packet payload.
John Savill Windows 10 Training

Developing and Implementing a Windows 10 Business Strategy​
Live Online Training on Tuesday, October 25th 
Register by October 19th and Save 15%!

Many organizations today are exploring adoption of Windows 10. Often touted as the last version of Windows, it is now a constantly evolving Windows as a Service solution. In this one-day training, you'll find out what this new model for Windows really means to your organization and what the benefits are once you've made the move to Windows 10.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×