Your company is preparing to upgrade their intrusion detection systems (IDSs) at three locations in the southeast United States. Three vendors have submitted RFP responses that you must evaluate. Each of the three vendor's RFP responses is in-line with the security and other requirements. What should you do to ensure the IDS platform is appropriate for your company?

A. Develop criteria and rate each IDS based on information in the RFP responses.
B. Create a lab environment to evaluate each of the three IDSs.
C. Benchmark each IDS's capabilities and experiences with similar sized companies.
D. Correlate current industry research with the RFP responses to ensure validity.

B
Explanation: You should create a lab environment to evaluate each of the three IDSs. This is the only way to fully determine if the products will meet the needs of your organization. This solution will also help to validate any metrics that were given in the RFP.
You should not develop criteria and rate each IDS based on information in the RFP responses. If you did this, your decision would be solely based on what the vendors say, not on actual test results.
You should not benchmark each IDS's capabilities and experiences with similar sized companies. This still does not involve testing the different choices.
You should not correlate current industry research with the RFP responses to ensure validity. Once again, this still relies on the information from the vendor.

Computer Science & Information Technology

You might also like to view...

If you want to specifically save a record, you can press the ________ keys

A) Alt and Enter B) Ctrl and Tab C) Shift and Enter D) Shift and Tab

Computer Science & Information Technology

When using a wildcard in a query criteria, a user should substitute a(n) ________ for one or more unknown character(s)

A) ampersands (&) B) pound signs (#) C) quotation marks (") D) asterisks (*)

Computer Science & Information Technology