Top 15 Most Popular Intrusion Detection Softwares | Nov 2024

Here are the top 15 most popular intrusion detection softwares as derived from our TpSort Score which is a continually popular score, it denotes an estimated popularity of a software.

1. ModSecurity

ModSecurity ModSecurity is an open source web application firewall. Working embedded in the web server, or standalone as a network appliance, it detects and prevents attacks against web applications.......

2. Sax2

Sax2 Ax3soft Sax2 is a professional intrusion detection and prevention software (NIDS) which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.With the insights into all operations in your network, Sax2 makes it easy to isolate and solve network problems, identify network bottleneck and bandwidth......

3. SSHGuard

SSHGuard Sshguard monitors services through their logging activity. It reacts to messages about dangerous activity by blocking the source address with the local firewall. Sshguard employs a clever parser that can transparently recognize several logging formats at once (syslog, syslog-ng, metalog, multilog, raw messages), and detects attacks for many services out......

4. Verisys

Verisys The Verisys File Integrity Monitoring system is a powerful software solution for Windows and Linux systems, with cross-industry applications including PCI and SOX compliance and data integrity assurance.......

5. syschangemon

syschangemon syschangemon - system change monitorPeriodically collects system configuration (eg. conffiles in /etc, binary files in /sbin, etc.) for changes, it can even run external commands and store their stdout and stderr for change monitoring.This can be useful as a HIDS (host based intrusion detection system) as well as in a......

6. Cyberarms Intrusion Detection and Defense System (IDDS)

Cyberarms Intrusion Detection and Defense System (IDDS) Out-of-the-box security for Remote Deskop, Exchange, OWA, SharePoint, CRM, generic IIS applications and many other server systems.......

7. Snare Server

Snare Server The Snare Server, from InterSect Alliance, is a proprietary Log Monitoring solution that builds on the open source Snare agents to provide a central audit event collection, analysis, reporting and archival system.Full source code and documentation is provided with this product, allowing InterSect Alliance partners, or your internal security team,......

8. VirIT eXplorer

VirIT eXplorer VirIT eXplorer is an AntiVirus and AntiMalware software for Microsoft Windows. VirIT eXplorer is distributed in two different versions: VirIT eXplorer PRO: the AntiVirus, AntiSpyware and AntiMalware suite with also Personal Firewall. VirIT eXplorer Lite: the FREE version, fully interoperable with other AntiVirus. VirIT eXplorer Lite will be fully functional......

9. GFI EventsManager

GFI EventsManager GFI EventsManager assists with monitoring and managing event logs, maintaining network health and security while also helping you to comply with various regulations and acts including SOX, PCI DSS, Code of Connection, HIPAA, data protection laws and others. This award-winning solution automatically processes and archives event logs, collecting the information......

10. Arpwatch

Arpwatch arpwatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer network. It generates a log of observed pairing of IP addresses with MAC addresses along with a timestamp when the pairing appeared on the network. It also has the option of sending an email to......

11. AIDE

AIDE AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker.It creates a database from the regular expression rules that it finds from the config file(s). Once this database is initialized it can be used to verify the integrity of the files. It has several message digest algorithms (see......

12. SIEMonster

SIEMonster OverviewKustodian’s SIEMonster: SIEM for everyone with no limitsAs a security professional, protecting your company’s assets from internal or external attacks is a never ending complex job. It is crucial that you have visibility across your entire environment. It’s like having a house alarm, there is no point having some rooms......

13. Barricade

Barricade We thought security products were too complex, difficult to use and inaccessible - so we set out to build the most simple, human and intuitive security product ever made. In other words the kind of security product we want for ourselves. At its core Barricade works like an early warning......

14. snort

snort Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and nearly 400,000 registered users, Snort has become the de facto standard for......

15. Tripwire

Tripwire Open Source Tripwire software is a security and data integrity tool useful for monitoring and alerting on specific file change(s) on a range of systems.......