quick post of 200 words

 There are a number of defensive technologies available to network security professionals, IDS, IPS, Firewalls, Honeypots, Honeynets, administrative, physical and technical controls.  Choose one of these defensive technologies and describe its function, how it is implemented and maintained.  Then pick a commercial or open source product in the same category and write your opinion in  support or opposition of implementing the product. 

Tags: No tags