top of page
Typing on a Computer

Intrusion Detection & Prevention

Service Components

Network intrusion is a real and business impacting event, and can be damaging in one or more ways to both operations as well as to the business.  The intrusion can be motivated in many ways for example:

  • Personal – An individual’s personal vendetta against a business or brand

  • Political – Hacktivist organisations damaging a brand or business’ operation

  • Financial – Extrusion of information for resale or financial gain

An intrusion attempt is the act of circumnavigating defenses or specifically targeting parts of the security systems, infrastructure devices or hosts. Intrusion attempts come in many forms and will commonly be part of multiple-staged probing of the network or resources for information on which to base subsequent attacks. The actual profile of intrusion events are wide ranging and the actual foot print in respect of the logs on network devices can be extremely small. This presents problems on several levels:

  • Management of different devices in the estate are spread across multiple departments

  • Devices many be managed by an external third party

  • Staff may not recognise or understand the relevance and the severity of a log event

Zero Day

Zero Day’ is a very common term used in the security market., intrusion detection systems allow businesses to increase their visibility of the more refined methods that malware, phishing, virus’’s, network scanning, port scanning, running exploits and brute force attacks can now have.

Intrusion Detection systems can now be deployed as separate appliances bundled into a number of border gateway security products as well as integrated at the host operating system and at the hypervisor level of VMware.

Regulatory Compliance

Security is, and for the foreseeable future will be, a multi layered approach. Although this product area has been widely left aside by most businesses, the change in the threat markets and some regulatory compliance such as PCI-DSS have provided compelling drivers for the implementation of solutions to both counteract the ‘real threat’ as well as raise security posture.

      Intrusion at Gateway


Traditionally intrusion detection was carried out at security border gateway’s or at key points of the network deployed as separate hardware appliances. Intrusion detection was deployed into businesses that had a higher level of security requirements or security focus.

Much has changed in the recent years, the advent of the cloud, application aware security products and the, introduction of branch level UTM (Unified Threat Management (UTM) devices to name a few.  IP Blocker List!




Key Benefits

  • Air Marshal is Meraki's wireless intrusion prevention (WIPS) solution. Integrated into every Meraki access point and centrally managed from the cloud, Air Marshal detects and neutralizes wireless threats, delivering state of the art protection to the most security conscious distributed networks.

for more information please contact our sales team 

or please call +353 (0) 1 899 1970

Screen Shot 2015-07-09 at 7.52.14 PM.png
Screen Shot 2015-07-09 at 7.53.31 PM.png

do u need technical support?

Coding Station
Call Center
bottom of page