Glossary of Compliance
Compliance Glossary
Our list of curated compliance glossary offers everything you to know about compliance in one place.
IDS
Intrusion Detection System (IDS) is a system or software that monitors the network traffic and system for signs of malicious activities and violation of any security policies. The IDS then issues alerts on the detection of any intrusions or security threats in real time so that database administrators or security analysts can take necessary actions to secure the system further. There are two types of IDS: host-based (installed on an individual’s system and server) and network-based (installed on a network). The IDS uses detection techniques, such as anomaly-based, signature-based, and behavior-based, to identify and report threats.
Additional reading
Security Issues in Cloud Computing: How To Prevent & Solve Them?
Mastering Data Center Compliance: Your Go-to Guide
PCI Compliant Hosting (All you need to know)

Sprinto: Your growth superpower
Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.
