Jason Harper


Jason Harper is a senior security engineer for a global company. He works on the policies and procedures that support network security technology.

Deploy Your Network IDS Effectively 2
Where you place your network Intrusion Detection System (IDS) sensors and how you manage the information they provide are crucial factors in how well the IDS protects your network.
Placing Your Controls
When you create ACLs or filters, you must tell the router when to apply them. You’ll want to place them so that your system uses router processing cycles efficiently.
Protect Your Network from Intrusion
A properly placed network IDS, such as Snort, is an important component of your defense-in-depth approach to network security.
IDS Signature Analysis
In signature analysis, the sensor looks not only at the header information, flags set, and packet shape, but also at the contents of the datagram-typically referred to as the packet payload.

Join the Conversation

Get answers to questions, share tips, and engage with the IT professional community at myITforum. Are you a data center professional? Join AFCOM for the best data center insights.

Sponsored Introduction Continue on to (or wait seconds) ×