There are a number of defensive technologies available to network security professionals, IDS, IPS, Firewalls, Honeypots, Honeynets, administrative, physical and technical controls. Choose one of these defensive technologies and describe its function, how it is implemented and maintained. Then pick a commercial or open source product in the same category and write your opinion in support or opposition of implementing the product.