<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Upgrading your IDS/IPS? Answer these 3 Key Questions First.

So, you are considering migrating your legacy or aging intrusion detection and prevention system (IDS/IPS or IDPS) to a modern alternative. In our work helping many organizations do exactly this, we at Stamus Networks learned a number of important lessons from our customers. 

We captured the insights gathered from our experience helping organizations migrate from their legacy IDS/IPS to a modern alternative in a practical guide designed to help you sort through the process. Check out “A Practical Guide for Migrating from your Legacy Intrusion Detection System (IDS/IPS) to a Modern Alternative

Get Practical Guide

One of the most important considerations is timing - that is, when should you plan on making the move to replace your legacy IDS. The drivers and timing are different for each organization, but we have found several questions that can help guide security executives determine when they should budget to replace their legacy IDS. 

So when considering when to allocate budget for the project, try to answer these 3 essential questions:

How much longer do you have with your current IDS/IPS?

Evaluating, selecting and deploying an upgrade to your legacy IDS can take a highly motivated team up to 3 months. And in large enterprises, we have seen the process extend out to 12 months or longer. Therefore, it is important to understand the runway of your current solution. 

This timeline can be dictated by your contract renewal cycle, or the end of a support contract, or through other internal organizational factors. We captured some of these reasons in a recent blog, “12 Signs it's Time to Upgrade your Legacy IDS/IPS”. Read it here >>>.

In order to answer this question, review the contract details for both your software licenses and any separate support arrangements you may have in place. And don’t forget to consider organizational policies that might impact your ability to continue using your current system. 

As your network and organization evolves, so must your security controls. As a security leader, you must continually balance your security investments with your organization’s risk tolerance. And you want to be confident that the controls you have deployed are sufficient to minimize your organizational exposure.

At what point will your legacy IDS/IPS no longer be enough?

If your IT infrastructure has undergone significant changes - such as a substantial shift to the cloud or massive increase in network traffic - it is critical that your network security monitoring has kept pace with these changes. 

The typical high-end legacy IDS, for example, was designed to effectively inspect 1 Gbps of network traffic while running the full suite of detection rules. If your network traffic has increased to 10Gpbs or beyond, this will no longer be sufficient. 

Similarly, if you have shifted a major portion of your computing and application infrastructure to a public or private cloud provider, your legacy IDS may not support that deployment model. 

Each of these scenarios create blindspots in your network defenses. At some point, these blindspots can render your controls ineffective, eroding your confidence and increasing your exposure. The question, of course, is when?

Are there staffing issues impacting legacy IDS/IPS operations?

In today’s employment climate, major personnel changes have become commonplace. These changes may adversely impact your team’s ability to support the systems you have in place, including your legacy IDS. 

In many organizations, the responsibility for operating and maintaining their network intrusion detection system falls on one or two individuals. The longer those systems have been in place, the more likely the original team of experts responsible for your IDS is no longer available. 

Legacy IDS have developed the well-justified reputation of being “alert cannons” due to the overwhelming volume of information they generate. Without sufficient automation in place, these systems can place a massive burden on the security operations teams charged with managing them. Often the staff responsible for the legacy IDS are your most productive and experienced and, therefore, become best candidates to be redeployed onto higher priority projects. Each redeployment can cause a gap in expertise managing and maintaining the legacy IDS.

Personnel changes are inevitable, but to the extent that you are able to anticipate a transition, your organization can mitigate the impact of the changes. Ask yourself if there are personnel events or changes that might justify looking at migrating from your legacy systems. 

Additional resources

OperationIDS_PracticalGuide_ThumbAt Stamus Networks, we have captured the insights gathered from our experience helping organizations migrate from their legacy IDS/IPS to a modern alternative in a practical guide designed to help you sort through the process. 

Check out this “A Practical Guide for Migrating from your Legacy Intrusion Detection System (IDS/IPS) to a Modern Alternative” 

Get Practical Guide

D. Mark Durrett

Mark is the chief marketing officer (CMO) at Stamus Networks, where he has responsibility for go-to-market strategy and execution. Mark started his career as an electrical engineer and worked in digital circuit design of networking and telecom hardware for over a decade. He has over 25 years of experience leading marketing, product management and engineering for technology companies. Mark has served as the senior product and marketing executive at Netsertive, Emerging Threats, Overture Networks, Bell and Howell, Covelight Systems and Hatteras Networks. Mark resides in North Carolina, USA.

Schedule a Demo of Stamus Security Platform

REQUEST A DEMO

Related posts

Introducing Clear NDR™

At Stamus Networks, we have always been driven by a commitment to openness, transparency, and...

Uncovered: SSP Identifies Massive Breach During Evaluation

For many organizations considering Network Detection and Response (NDR), one of the most valuable...