Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 18, 2026 · Information Security

25 Essential Network Security Devices and Their Roles

The article outlines over 25 common network security devices—from firewalls and NGFWs to EDR, SIEM, and UTM—detailing their core functions, typical deployment scenarios, and concrete examples, while emphasizing a layered, need‑based approach to building an effective defense.

EDRFirewallsIDS
0 likes · 28 min read
25 Essential Network Security Devices and Their Roles
Open Source Linux
Open Source Linux
May 16, 2023 · Information Security

Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter

This comprehensive guide explains intrusion detection and prevention systems, firewalls, waterwalls, Netfilter, and essential Linux firewall tools such as iptables, firewalld, and nftables, covering their architectures, command syntax, rule management, NAT, and packet capture with tcpdump.

IDSIPSLinux
0 likes · 24 min read
Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Nov 15, 2022 · Information Security

Step‑by‑Step Guide to Installing Suricata and Understanding Its Working Modes

This guide walks through installing Suricata on a Linux system, covering prerequisite libraries, source compilation, configuration paths, execution command, and an analysis of its packet‑processing modes—including single, work, and autofp—while illustrating thread workflow and recommending optimal setups for multi‑NIC environments.

IDSIPSLinux Installation
0 likes · 7 min read
Step‑by‑Step Guide to Installing Suricata and Understanding Its Working Modes
Open Source Linux
Open Source Linux
May 11, 2022 · Information Security

What Is a Firewall? Types, Functions, and How It Secures Networks

This comprehensive guide explains what a firewall is, its origins, the hardware and software types, session management, NAT, VPN, security zones, policies, threat mitigation, DoS protection, IDS/IPS, deep inspection, and performance considerations, providing a solid foundation for anyone interested in network security.

DoS protectionIDSIPS
0 likes · 42 min read
What Is a Firewall? Types, Functions, and How It Secures Networks
Architects Research Society
Architects Research Society
Aug 15, 2019 · Information Security

Understanding IDS, IPS, and UTM: Differences and Deployment Considerations

The article explains the fundamental differences between intrusion detection systems (IDS), intrusion prevention systems (IPS), and unified threat management (UTM) devices, covering their detection methods, placement strategies, operational trade‑offs, and maintenance requirements to help security professionals choose and manage the appropriate solution.

IDSIPSUTM
0 likes · 9 min read
Understanding IDS, IPS, and UTM: Differences and Deployment Considerations
dbaplus Community
dbaplus Community
Aug 9, 2017 · Information Security

Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery

This guide outlines practical steps for constructing a secure enterprise operations platform, covering network zone segmentation, selection and deployment of firewalls, IPS/IDS/WAF, endpoint management, web traffic control, monitoring, disaster‑recovery procedures, and incident response best practices to protect corporate data and systems.

IDSIPSWAF
0 likes · 14 min read
Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery
MaGe Linux Operations
MaGe Linux Operations
Jul 31, 2015 · Information Security

Master Linux Network Security: Firewall, IDS, IPS, and iptables Deep Dive

This article outlines Linux network security fundamentals, covering firewall types and placement, intrusion detection and prevention systems, honeypots, vulnerability scanners, rootkits, and provides a detailed explanation of iptables/netfilter architecture, tables, chains, rules, and packet handling actions.

IDSIPSLinux
0 likes · 6 min read
Master Linux Network Security: Firewall, IDS, IPS, and iptables Deep Dive