NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [FW1] intrusion detection - benifits?



Oh and by the way, holding a gun to someone, is not an analogy of network
security.  We are not threatening employees.  We are an enabler not a
disabler.  Our job is to protect their interests, not frighten them.  This
is not an issue that you are wrong.  You do not have to IDS your internal
net.  It is simply added security.  If it is a cost issue, then you simply
document that and get sign-off on that decision.

Let us not limit ourselves to what we know and believe.  Let us instead seek
the aid and knowledge of our peers to find the best solution we can offer.
Ego has no place in security.  I am often wrong and when I find out, I am
thrilled to know that my next solution will be all that much better.

----- Original Message -----
From: "Rogue Bolo" <[email protected]>
To: "Scott Schindler" <[email protected]>; "fw-1-mailinglist@lists. us.
checkpoint. com (E-mail)" <[email protected]>
Sent: Wednesday, November 29, 2000 8:14 AM
Subject: Re: [FW1] intrusion detection - benifits?


> Which makes more sense....keeping a gun trained on
> your wife and children, or on the thugs walking up and
> down your street looking for trouble? Yes it is an
> extreme example but it makes a point.
>
> --- Scott Schindler <[email protected]> wrote:
> >
> > Would a security professional please tell me where
> > most attacks and costs
> > related to security are initiated?  Would that be
> > from outside or inside?
> > (This is all rhetorical by the way)
> >
> > Trust employees?  Intentionally or unintentionally,
> > numbers don't lie.
> > Welcome to security.  Trust no one.  But I could be
> > lying, wouldn't that be
> > ironic.
> >
> > ----- Original Message -----
> > From: "Andrew Bagrin" <[email protected]>
> > To: "Pellowski, Tom" <[email protected]>;
> > "fw-1-mailinglist@lists. us.
> > checkpoint. com (E-mail)"
> > <[email protected]>
> > Sent: Tuesday, November 28, 2000 4:06 PM
> > Subject: Re: [FW1] intrusion detection - benifits?
> >
> >
> > >
> > > If you don't trust users on your internal network.
> > > Andrew Bagrin
> > > Secure-1
> > >> > > www.secure-1.com
> > > ----- Original Message -----
> > > From: Pellowski, Tom <[email protected]>
> > > To: fw-1-mailinglist@lists. us. checkpoint. com
> > (E-mail)
> > > <[email protected]>
> > > Sent: Tuesday, November 28, 2000 8:45 AM
> > > Subject: [FW1] intrusion detection - benifits?
> > >
> > >
> > > >
> > > > Greetings:
> > > >
> > > > I have this question that I would like the
> > community to give me their
> > > .02
> > > > worth.
> > > >
> > > > In an arena running Checkpoint (whatever flavor)
> > is it really worth
> > > the
> > > > time, expense, and possible network performance
> > compromises to put a
> > > > separate intrusion detection appliance online in
> > front of the
> > > firewall?
> > > >
> > > > I understand that there are tons of "well, you
> > could.." but what I am
> > > really
> > > > after is "your" opinion. Would you, as the FW
> > admin/engineer, do it.
> > > >
> > > > Obivously I am looking for some backup here as I
> > am having a intrusion
> > > > detection package rammed down my throat, and
> > frankly, I don't want it.
> > > But
> > > > my only defense at this point is that "is
> > something more to manage".
> > > >
> > > > Thanks to all in advance!!!
> > > >
> > > > Tom
> > > >
> > > >
> > > >
> > > >
> > > >
> > >
> >
> ========================================================================
> > > ====
> > > ====
> > > >      To unsubscribe from this mailing list,
> > please see the
> > > instructions at
> > > >
> > http://www.checkpoint.com/services/mailing.html
> > > >
> > >
> >
> ========================================================================
> > > ====
> > > ====
> > >
> > >
> > >
> > >
> >
> ========================================================================
> > > ========
> > >      To unsubscribe from this mailing list, please
> > see the instructions
> > > at
> > >
> > http://www.checkpoint.com/services/mailing.html
> > >
> >
> ========================================================================
> > > ========
> >
> >
> >
> ========================================================================
> ========
> >      To unsubscribe from this mailing list, please
> > see the instructions at
> >
> > http://www.checkpoint.com/services/mailing.html
> >
> ========================================================================
> ========
>
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Shopping - Thousands of Stores. Millions of Products.
> http://shopping.yahoo.com/


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.