Access "Will intrusion prevention systems live up the hype?"
This article is part of the July 2004 issue of Olympic trials: Securing the summer games
Intrusion prevention systems (IPSes) are being touted as the latest, greatest savior of the network. And why not? Unlike signature-based intrusion detection systems (IDSes), which passively examine traffic and trigger alerts based on suspicious packets, IPSes perform intense application-layer inspection and actively block identified attacks. Where IDSes are good for after-you've-been-hacked forensic analysis, IPSes protect your digital backside while an attack is in progress. That's what the marketing brochures say, anyway. The reality, unfortunately, isn't quite so rosy. The state of the art in IPS is promising but immature and incomplete. Characteristic of many emerging markets, there's little vendor agreement about what IPSes are, what they should do and where they should live in the network. Some vendors pitch IPSes as perimeter-based devices intended to replace firewalls. Others position them in front of or behind firewalls in a belt-and-suspenders topology. Still others say IPSes should reside closer to or on the host itself, preventing execution of ... Access >>>
Premium Content for Free.
IT network security: Securing the summer Olympics
by Dennis McCafferty, Contributing Writer
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
Acceptable use policies will minimize email risks
by George Wrenn, CISSP
Learn why setting comprehensive email acceptable use policies can help minimize email risks and secure your email applications.
How to prevent phishing scams and protect customers
by Nalneesh Gaur
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
- IT network security: Securing the summer Olympics by Dennis McCafferty, Contributing Writer
USB security tokens may not be as secure as you think
by Tom Bowers, Contributor
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
Will intrusion prevention systems live up the hype?
Will intrusion prevention ever live up to its promise?
- USB security tokens may not be as secure as you think by Tom Bowers, Contributor
The Fulda Gap and defense in depth strategy
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.
- The Fulda Gap and defense in depth strategy
More Premium Content Accessible For Free
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...