That WAS Scott, and it was NOT you Shindler. Look just below my response.
Just a note, there are many decaffinated brands on the market that are just
as tasty as the caffinated kinds.
(couldn't resist)
-----Original Message-----
From: Scott Schindler [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, November 29, 2000 4:21 PM
To: Tim Cullen; 'Scott Murray'; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: [FW1] intrusion detection - benifits?
What? Umm, read who said what again. Scott, that being me, said nothing of
the sort. I think IDS is 100% necessary for a truly secure environment.
But it was a simple mistake, no biggie.
----- Original Message -----
From: "Tim Cullen" <[EMAIL PROTECTED]>
To: "'Scott Murray'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Tuesday, November 28, 2000 11:58 AM
Subject: RE: [FW1] intrusion detection - benifits?
>
> I totally disagree with Scott. It is not for the truley paranoid. It
> is
> becoming a necessary tool for a lot of companies that I deal with.
> Outside
> gives you the ability to see what you look like to the outside world at
> any
> given time. With the right tool you can even get real time information
> as
> well as alerting and in some cases an ability to fix found issues. Now
> take
> this and put it on the inside and you have got a pretty awesome addition
> to
> the security of your network.
>
> True there are a lot of tools out there that have no purpose being there
> but
> the market is much like the firewall market a few years ago. As a
> matter of
> fact I remember seeing the same conversations about the need of an
> "unnecessary" thing called a firewall. We see how that turned out.
>
> Given that 80% of hacks are from internal resources or personnel I would
> have to say that some type of tracking is a long time overdue. I see
> this
> as a necessary component to the total sucurity package.
>
> -----Original Message-----
> From: Scott Murray [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, November 28, 2000 11:21 AM
> To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: Re: [FW1] intrusion detection - benifits?
>
>
>
> Tom,
>
> I personally don't see the real need to have IDS running outside the
> Firewall, I would have it running INSIDE the Firewall for the overly
> paranoid folks. It gives you a little more peace of mind.
>
> Scott
>
>
> >From: "Pellowski, Tom" <[EMAIL PROTECTED]>
> >To: "fw-1-mailinglist@lists. us. checkpoint. com (E-mail)"
> ><[EMAIL PROTECTED]>
> >Subject: [FW1] intrusion detection - benifits?
> >Date: Tue, 28 Nov 2000 08:45:05 -0500
> >
> >
> >Greetings:
> >
> >I have this question that I would like the community to give me their
> .02
> >worth.
> >
> >In an arena running Checkpoint (whatever flavor) is it really worth the
> >time, expense, and possible network performance compromises to put a
> >separate intrusion detection appliance online in front of the firewall?
> >
> >I understand that there are tons of "well, you could.." but what I am
> >really
> >after is "your" opinion. Would you, as the FW admin/engineer, do it.
> >
> >Obivously I am looking for some backup here as I am having a intrusion
> >detection package rammed down my throat, and frankly, I don't want it.
> But
> >my only defense at this point is that "is something more to manage".
> >
> >Thanks to all in advance!!!
> >
> >Tom
> >
> >
> >
> >
> >=======================================================================
> ====
> =====
> > To unsubscribe from this mailing list, please see the
> instructions at
> > http://www.checkpoint.com/services/mailing.html
> >=======================================================================
> ====
> =====
>
> ________________________________________________________________________
> ____
> _________
> Get more from the Web. FREE MSN Explorer download :
> http://explorer.msn.com
>
>
>
> ========================================================================
> ====
> ====
> To unsubscribe from this mailing list, please see the instructions
> at
> http://www.checkpoint.com/services/mailing.html
> ========================================================================
> ====
> ====
>
>
> ========================================================================
> ========
> To unsubscribe from this mailing list, please see the instructions
> at
> http://www.checkpoint.com/services/mailing.html
> ========================================================================
> ========
============================================================================
====
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
============================================================================
====
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================