Skip to main content

Posts

Showing posts from October, 2021

Hybrid IT

  Hybrid IT is an approach to enterprise computing in which an organization provides and manages some information technology (IT) resources in-house but uses cloud-based services for others. A hybrid approach allows an enterprise to maintain a centralized approach to IT governance while exploiting the benefits of cloud computing. Hybrid IT vs. hybrid cloud The term hybrid IT is often used interchangeably with the term hybrid cloud.  Hybrid cloud, however, can also refer to a cloud architecture in which a vendor who has a private cloud forms a partnership with a public cloud provider -- or a public cloud provider who forms a partnership with a vendor that provides private cloud platforms. So, while hybrid IT is a form of hybrid cloud, not all hybrid clouds are considered hybrid IT. The benefits of hybrid IT There are three forces driving the adoption of hybrid IT: an enterprise's need to maintain control of data for security purp...

Intrusion Detection System (IDS)

  An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered. While anomaly detection and reporting are the primary functions of an IDS, some intrusion detection systems are capable of taking actions when malicious activity or anomalous traffic is detected, including blocking traffic sent from suspicious Internet Protocol (IP) addresses. An IDS can be contrasted with an intrusion prevention system (IPS), which monitors network packets for potentially damaging network traffic, like an IDS, but has the primary goal of preventing threats once detected, as opposed to primarily detecting and recording threats. How do intrusion detection systems work? Intrusion detection systems are used to detect anomalies with the aim of catching hackers before they do real damage to a network. IDSes can be either network- or host-based. A host-based intrusion detection system is...