How to find network threats using NIDS

Presented by

Tatyana Shishkova, security researcher at Kaspersky

About this talk

Protecting corporate networks is a challenging task. In this webinar, I will elaborate on Network Intrusion Detection Systems (NIDS) – one of vital components of security solutions that analyzes network traffic and is used in perimeter protection. This webinar will cover the following topics: •What is NIDS, how does it work and what are the popular open-source solutions? •Which threats can be effectively detected using NIDS? •Real-life examples of malicious traffic and rules to catch them •Limitations of NIDS and possible workarounds
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (256)
Subscribers (59270)
On this channel, Kaspersky experts share their knowledge and key insights into high-fidelity threat hunting and intelligence, incident management, malware analysis, reverse engineering, security solutions, and several other vital aspects of the cyberworld. To keep you up to date, the experts also provide detailed webinars and workshops on how Kaspersky security solutions and services can halt and prevent a vast range of malicious attacks conducted by cybercriminals. Kaspersky is a global cybersecurity and digital privacy company that has been providing protection for 25 years, with over 400 million users from more than 200 countries. Kaspersky experts' mission is to help you find the perfect weapon to protect against any cyberthreat, carried out by even the most sophisticated cybercriminals. Kaspersky researchers are top-notch cybersecurity and protection technology experts, who regularly take part in leading information security events worldwide as best-in-class speakers. Kaspersky’s deep threat intelligence and security expertise is constantly being transformed into innovative security solutions and services that protect businesses, critical infrastructure, governments and consumers around the globe. Subscribe and learn more about the latest cybersecurity discoveries on the threat landscape and how to defend against them. Contact us at