{"id":16108,"date":"2020-10-08T07:46:03","date_gmt":"2020-10-08T05:46:03","guid":{"rendered":"https:\/\/www.tecsens.com\/protecting-my-company-from-intrusion\/"},"modified":"2021-04-16T11:24:46","modified_gmt":"2021-04-16T09:24:46","slug":"protecting-my-company-from-intrusion","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/","title":{"rendered":"Protecting my company from intrusion"},"content":{"rendered":"\n<p>We are<a href=\"https:\/\/www.dsn.gob.es\/es\/actualidad\/sala-prensa\/octubre-mes-europeo-ciberseguridad-2020-cybersecmonth#:~:text=Octubre%3A%20Mes%20Europeo%20de%20la%20Ciberseguridad%202020%20%2D%20Cybersecmonth,-Left&amp;text=En%20octubre%20se%20celebra%20el,los%20ciudadanos%20de%20la%20UE\" target=\"_blank\" rel=\"noreferrer noopener\"> in European Cybersecurity Month and as<\/a> we discussed in the<a href=\"https:\/\/www.tecsens.com\/en\/?p=16088\" target=\"_blank\" rel=\"noreferrer noopener\">previous post<\/a>,cyberattacks are the order of the day. That&#8217;s why we&#8217;re going to tell you a way to protect your business from intrusion.<\/p>\n\n<p>A few years ago it was <strong>thought that cybersecurity tools were<\/strong> only necessary and were only available to large organizations. Something that has given absolute change, since the events that have been happening in recent times show that no one is free to suffer it. A 360-degree twist that has opened the door to millions of doubts about the right cybersecurity tools or systems.<\/p>\n\n<p>One of the big demands <strong>is the intrusion detection and prevention systems.<\/strong> But also the ones that generate the most doubts.<\/p>\n\n<h2 class=\"wp-block-heading\">IDS\/IPS detection and prevention systems:<\/h2>\n\n<p>Both solutions are different types of software that implement attack detection motorization, on computers, or on the company&#8217;s network. Which encourage logging, alerting, and response against any type of previously defined failure.<\/p>\n\n<p>However, each system is responsible for performing different functions. What we detail below:<\/p>\n\n<h2 class=\"wp-block-heading\">\u00b7 <strong>IDS<em> (Intrusion Detection System)<\/em> or Intrusion Detection Systems:<\/strong><\/h2>\n\n<p>It is a system that detects unauthorized access, using an updated database with many known signatures. The solution monitors incoming traffic using a full network scan and port sweep, comparing it to information about malicious elements.<\/p>\n\n<p>In the face of any possible suspicious activity, the detection system issues an early alert that directs the system administrator.<\/p>\n\n<h2 class=\"wp-block-heading\">\u00b7 <strong>IPS <em>(Intrusion Prevention System) <\/em>or Intrusion Prevention Systems:<\/strong><\/h2>\n\n<p>This system is located between the firewall and the rest of the network where it is responsible for monitoring the input packets. Before letting them in, check their purpose through real-time analysis based on signatures, anomalies, based on the pattern of normal traffic behavior, or you can even intervene on the basis of very specific security policies. This prevents the entry of suspicious traffic to the rest of the corporate network.  <\/p>\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>What is the main difference between the two<\/strong>?<\/h2>\n\n<p>The main difference is that<strong> IDS is a reactive system<\/strong>of action, i.e. simply alarm and on the other hand <strong>ipS is a preventive action system,<\/strong>not only alarm if it does not also prevent possible attacks. Sometimes they usually go together as they are complementary.<\/p>\n\n<p>These tools can be the salvation and ensure the business continuity of organizations in everything related to their communications, databases etc.<\/p>\n\n<h3 class=\"wp-block-heading\">And you, you want to protect your company from intrusions or do you play it?<\/h3>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are in European Cybersecurity Month and as we discussed in theprevious post,cyberattacks are the order of the day. That&#8217;s why we&#8217;re going to tell you a way to protect your business from intrusion. A few years ago it was thought that cybersecurity tools were only necessary and were only available to large organizations. Something [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":15101,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[503,504],"tags":[392,347,515,382,90],"class_list":["post-16108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-en","category-it-security","tag-cybersecurity","tag-internet-en-2","tag-networks-en","tag-security","tag-software-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting my company from intrusion - Tecsens -<\/title>\n<meta name=\"description\" content=\"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting my company from intrusion - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-08T05:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-16T09:24:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1522\" \/>\n\t<meta property=\"og:image:height\" content=\"857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Protecting my company from intrusion\" \/>\n<meta name=\"twitter:description\" content=\"How to protect my company from intrusions? Question that is repeated over and over again in many organizations. One of the ideal answers would be IDS\/IPS systems. But what differences and functions exist between them? Tecsens -\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Protecting my company from intrusion\",\"datePublished\":\"2020-10-08T05:46:03+00:00\",\"dateModified\":\"2021-04-16T09:24:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\"},\"wordCount\":409,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\",\"keywords\":[\"Cybersecurity\",\"Internet\",\"Networks\",\"Security\",\"software\"],\"articleSection\":[\"Consulting\",\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\",\"name\":\"Protecting my company from intrusion - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\",\"datePublished\":\"2020-10-08T05:46:03+00:00\",\"dateModified\":\"2021-04-16T09:24:46+00:00\",\"description\":\"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg\",\"width\":1522,\"height\":857,\"caption\":\"Protect your business from intrusion\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting my company from intrusion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting my company from intrusion - Tecsens -","description":"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/","og_locale":"en_US","og_type":"article","og_title":"Protecting my company from intrusion - Tecsens -","og_description":"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.","og_url":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/","og_site_name":"Tecsens","article_published_time":"2020-10-08T05:46:03+00:00","article_modified_time":"2021-04-16T09:24:46+00:00","og_image":[{"width":1522,"height":857,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_title":"Protecting my company from intrusion","twitter_description":"How to protect my company from intrusions? Question that is repeated over and over again in many organizations. One of the ideal answers would be IDS\/IPS systems. But what differences and functions exist between them? Tecsens -","twitter_image":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Protecting my company from intrusion","datePublished":"2020-10-08T05:46:03+00:00","dateModified":"2021-04-16T09:24:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/"},"wordCount":409,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","keywords":["Cybersecurity","Internet","Networks","Security","software"],"articleSection":["Consulting","IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/","url":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/","name":"Protecting my company from intrusion - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","datePublished":"2020-10-08T05:46:03+00:00","dateModified":"2021-04-16T09:24:46+00:00","description":"The differences between IPS\/IDS prevention and detection systems, the security tools that can protect an enterprise from intruders.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/TECSENS-esquema-IDSvsIPS.jpg","width":1522,"height":857,"caption":"Protect your business from intrusion"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/protecting-my-company-from-intrusion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Protecting my company from intrusion"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=16108"}],"version-history":[{"count":7,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16108\/revisions"}],"predecessor-version":[{"id":22194,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/16108\/revisions\/22194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/15101"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=16108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=16108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=16108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}