Defensive security pipeline

Comparison Table: Firewalls vs. IDS/IPS vs. SIEM vs. EDR

Feature

Firewall (nftables, iptables, pfSense)

IDS/IPS (Snort, Suricata)

SIEM (Wazuh, Splunk)

EDR (CrowdStrike, Wazuh EDR)

Primary Role

Filter traffic based on rules

Detect/block malicious traffic

Log correlation, alerting, compliance

Detect/respond to endpoint threats

Detection Method

Rule-based (allow/deny)

Signature + anomaly detection

Rule-based + anomaly (if configured)

Behavioral analysis + threat intelligence

Prevention Capability

Blocks traffic based on rules

IPS can block, IDS alerts

No (alerting only)

Can block processes, isolate hosts

Data Source

Network traffic (L3/L4 filtering)

Network traffic (packet inspection)

Logs (network, endpoints, apps)

Endpoint processes, memory, files

Scope

Network perimeter/internal segmentation

Network-focused

Broad (entire infrastructure)

Endpoint-focused (workstations, servers)

Best For

Access control, network segmentation

Real-time threat blocking

Incident investigation, compliance

Advanced malware, lateral movement detection

A mature security stack combines:

  1. Firewall β†’ Blocks unauthorized access.

  2. IDS/IPS β†’ Stops known attacks in traffic.

  3. SIEM β†’ Correlates alerts from all sources.

  4. EDR β†’ Hunts for endpoint compromises.

  5. NTA (Network Trafific Analysis) β†’ Detects stealthy threats in network flows.

Last updated