<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Upgrading your IDS/IPS? Answer these 3 Key Questions First.

So, you are considering migrating your legacy or aging intrusion detection and prevention system (IDS/IPS or IDPS) to a modern alternative. In our work helping many organizations do exactly this, we at Stamus Networks learned a number of important lessons from our customers. 

We captured the insights gathered from our experience helping organizations migrate from their legacy IDS/IPS to a modern alternative in a practical guide designed to help you sort through the process. Check out “A Practical Guide for Migrating from your Legacy Intrusion Detection System (IDS/IPS) to a Modern Alternative

Get Practical Guide

One of the most important considerations is timing - that is, when should you plan on making the move to replace your legacy IDS. The drivers and timing are different for each organization, but we have found several questions that can help guide security executives determine when they should budget to replace their legacy IDS. 

So when considering when to allocate budget for the project, try to answer these 3 essential questions:

How much longer do you have with your current IDS/IPS?

Evaluating, selecting and deploying an upgrade to your legacy IDS can take a highly motivated team up to 3 months. And in large enterprises, we have seen the process extend out to 12 months or longer. Therefore, it is important to understand the runway of your current solution. 

This timeline can be dictated by your contract renewal cycle, or the end of a support contract, or through other internal organizational factors. We captured some of these reasons in a recent blog, “12 Signs it's Time to Upgrade your Legacy IDS/IPS”. Read it here >>>.

In order to answer this question, review the contract details for both your software licenses and any separate support arrangements you may have in place. And don’t forget to consider organizational policies that might impact your ability to continue using your current system. 

As your network and organization evolves, so must your security controls. As a security leader, you must continually balance your security investments with your organization’s risk tolerance. And you want to be confident that the controls you have deployed are sufficient to minimize your organizational exposure.

At what point will your legacy IDS/IPS no longer be enough?

If your IT infrastructure has undergone significant changes - such as a substantial shift to the cloud or massive increase in network traffic - it is critical that your network security monitoring has kept pace with these changes. 

The typical high-end legacy IDS, for example, was designed to effectively inspect 1 Gbps of network traffic while running the full suite of detection rules. If your network traffic has increased to 10Gpbs or beyond, this will no longer be sufficient. 

Similarly, if you have shifted a major portion of your computing and application infrastructure to a public or private cloud provider, your legacy IDS may not support that deployment model. 

Each of these scenarios create blindspots in your network defenses. At some point, these blindspots can render your controls ineffective, eroding your confidence and increasing your exposure. The question, of course, is when?

Are there staffing issues impacting legacy IDS/IPS operations?

In today’s employment climate, major personnel changes have become commonplace. These changes may adversely impact your team’s ability to support the systems you have in place, including your legacy IDS. 

In many organizations, the responsibility for operating and maintaining their network intrusion detection system falls on one or two individuals. The longer those systems have been in place, the more likely the original team of experts responsible for your IDS is no longer available. 

Legacy IDS have developed the well-justified reputation of being “alert cannons” due to the overwhelming volume of information they generate. Without sufficient automation in place, these systems can place a massive burden on the security operations teams charged with managing them. Often the staff responsible for the legacy IDS are your most productive and experienced and, therefore, become best candidates to be redeployed onto higher priority projects. Each redeployment can cause a gap in expertise managing and maintaining the legacy IDS.

Personnel changes are inevitable, but to the extent that you are able to anticipate a transition, your organization can mitigate the impact of the changes. Ask yourself if there are personnel events or changes that might justify looking at migrating from your legacy systems. 

Additional resources

OperationIDS_PracticalGuide_ThumbAt Stamus Networks, we have captured the insights gathered from our experience helping organizations migrate from their legacy IDS/IPS to a modern alternative in a practical guide designed to help you sort through the process. 

Check out this “A Practical Guide for Migrating from your Legacy Intrusion Detection System (IDS/IPS) to a Modern Alternative” 

Get Practical Guide

Schedule a Demo of Stamus ND or Stamus NDR

REQUEST A DEMO

Related posts

12 Signs it’s Time to Upgrade your Legacy IDS/IPS

So, you are considering migrating your legacy or aging intrusion detection and prevention system...

Upcoming Webinar: The Case for Upgrading Your Network Defenses

On 16 November 2021, my colleague Ed Mohr and I will be giving our second talk entitled “The Case...

Spin up a Complete Suricata Network Security Platform in Under 2 Minutes

Believe it or not, you can launch a turnkey Suricata IDS/IPS/NSM installation – with as few as 4...