Intrusion Detection

Armor's host-based IDS monitors your traffic in and out of the host server or instance. All event data collected by host-based IDS is integrated with data collected by other security appliances monitored by Armor, and correlated to identify suspicious patterns and behavior.

Intrusion Detection System Icon

Detect Intrusions at the Point of Attack

Armor’s enterprise-class host-based IDS performs network traffic analysis to detect threats and alert on suspicious activity.

Private Cloud Icon

Defense in Depth for Your Cloud Workloads

Armor’s host-based IDS is one part of an integrated suite of security capabilities to provide defense-in-depth for your workloads.

Faster Audit Icon

Audit-Ready Compliance

Host-based IDS capabilities help you meet key controls for major compliance mandates such as PCI DSS, GDPR, HIPAA, and HITRUST.

Host Based Intrusion Detection System Diagram

How It Works

With visibility to inbound and outbound activity at the host, Armor inspects anomalous traffic against predefined policies – detecting attacks like generic SQL injections, generic XSS attacks, DoS, and generic web app effects.

This service provides an agent-based IDS on the installed host for network traffic analysis and reporting on activities taking place on the host, based around policies defined by Armor.

Ready to Get Started?

Get started with our pricing tool or chat with our experts for answers on-demand.