by the Kali Linux OS (Unix and Linux), it is part of the Snort software product and works in passive mode to collect data about the system. Cisco IPS Figure 2: Monitoring of IPS Sensors Using Cisco IPS Cisco IPS implements deep packet surveillance function, which effectively counteracts a wide range of network cyber attacks. The control element is represented by the Cisco IOS integrated threat monitoring control system and is complemented by the Cisco IOS Flexible Packet Matching feature. This tool allows a computer network effectively to operate, taking into account the following factors: Figure 3: View window of threat indicators in time Figure 4: InfoWatch Traffic Monitor report window Figure 5: Symantec DeepSight Threat Management System window of the network. Also, IPS allows automatic activation of network and system protection, even in the absence of administrative control. The system also provides comprehensive network protection (without degrading the gateway’s performance) against unwanted traffic, IM and P2P, including detection and prevention of existing exploits, known and unknown vulnerabilities, tunneling attempts (which may indicate data leakage), and prevent misuse of the protocol, which may indicate potential threats and third-party software. It also provides protection against insider threats and vulnerabilities of applications and servers [27]. Figure 7: TippingPoint NGIPS information panel (real-time data scanning to find potential threats) and to pass them through service filters of digital vaccination Digital Vaccine and promptly to take appropriate action. The threat analysis implemented in the system provides the level of transparency that is necessary to optimize the state of information security throughout the organization [28]. Figure 10: DefensePro software window intrusions and attacks in real time, which ensures the continuity of the network and applications (Fig. 10). It protects against the use of application vulnerabilities (application misuse), the spread of malicious software, network anomalies, malicious domains and IP addresses, information theft, Trojans and from DDoS (DoS) cyber attacks, spoofing, phishing, zero-day, SSL-based and authorization pages and CDN |17]. Figure 9: Axoft invGUARD system report window Figure 11: Kaspersky Anti Targeted Attack Platform software window Table 1. Intrusion detection systems a summary of the results of the analysis