Email Alerts
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Essentials: Threat detection
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises have to be nimble on the security front in order to keep data safe and attackers at bay. This Essenti... E-Zine
-
Comparing five of the top network-based inline IPS appliances
In this issue of Information Security magazine, we put five appliances to the test. Should they be part of your playbook? We review SecureWave's Sanctuary Device Control 3.0.1, Secure Software's CodeAssure Suite, Trend Micro's InterScan Web Security ... E-Zine
-
Firewall security best practices: Get firewall network security advice
Get to know your firewall inside and out with this compilation of resources on firewall vulnerabilities, configuration and more. Learning Guide
-
Intrusion detection and prevention: IDS/IPS security guide
This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, incl... Learning Guide
-
Wireless intrusion detection systems: WLAN security and protection guide
In this mini learning guide, which is a part of the SearchSecurity.com IDS/IPS Security Guide, security managers and staff will learn more about wireless intrusion detection systems and WLAN security, including how to use a WIPS to monitor wireless t... guide
-
Intrusion detection: How to use IDS IPS tools to secure the enterprise
In this mini learning guide, security managers and professionals will learn about the features and capabilities of some of the most popular IDS/IPS tools available today, and well has how to use them. guide
-
IPS IDS best practices: Implementation and deployment
In this mini learning guide, which is a part of the SearchSecurity.com IDS/IPS Security Guide, security pros will learn more about IPS/IDS best practices for deployment and implementation in the enterprise. guide
-
Introduction to IDS IPS: Network intrusion detection system basics
This one-page guide, which is a part of the SearchSecurity.com IDS/IPS Security Guide, acts as an introduction to both IDS and network intrusion prevention system (IPS) technology. Here, security professionals will learn how to determine which IDS/IP... guide
-
Quiz: Network content monitoring must-haves
See if you know the essentials of network content monitoring in this SearchSecurity.com Security School quiz. Quiz
-
Strengthening policies for endpoint control
This security school explores new strategies, policies, practices and tools that can be used to reign in unruly endpoints. Learn how to avoid mistakes, inventory your organization's exposures and apply stronger endpoint controls. partOfGuideSeries
-
Best Intrusion Detection/Prevention Products 2011
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection. Guide
-
Readers' Choice Awards 2011
Best Security Information and Event Management Products 2011 Guide
- See more Essential Knowledge on Network Intrusion Prevention (IPS)
-
Sourcefire updates malware detection, malware analysis capabilities
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware. News | 21 May 2013
-
Marty Roesch pushes collective analysis, underscores cyberthreat intelligence
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction. News | 08 Feb 2012
-
IT security pros acknowledge network security weaknesses, configuration issues
Improperly configured network devices and the inability to measure the network security posture make most IT organizations incapable of finding gaps in their systems, according to a new survey. News | 13 Oct 2011
-
Testing firm finds increase in IPS security performance
NSS Labs, Inc. said tuning is crucial in improving network IPS effectiveness. Some vendors failed certain tests, leaving gaping holes in defenses, the testing firm said. Article | 10 Jan 2011
-
Experts laud IPS virtual patching, but warn against misuse
Virtual patching with intrusion prevention systems can offer a quick fix for vulnerabilities on an enterprise network, say experts at RSA Conference 2010, but the technique is no substitute for proper system and application patching. Article | 04 Mar 2010
-
White House declassifies CNCI summary, lifts veil on security initiatives
Summary document outlines ongoing initiatives to improve cybersecurity at the federal level as well as the security of the supply chain and private networks of critical infrastructure facilities. Article | 02 Mar 2010
-
IBM announcements mark two years of ISS marriage
The ISS unit has produced a number of updates, including unified threat management for small businesses and a virtual appliance for its network intrusion prevention system (IPS). Article | 25 Sep 2008
-
NitroSecurity covers its bases with RippleTech deal
NitroSecurity Inc. will integrate log management and database activity monitoring with security incident and event management (SIEM). Article | 16 Jul 2008
-
TippingPoint introduces Core Controller to manage IPS appliances
As 10 gigabit networks grow, enterprises tackle the high cost of intrusion prevention Article | 03 Mar 2008
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Article | 22 Aug 2007
- See more News on Network Intrusion Prevention (IPS)
-
The evolution of threat detection and management
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses. Tip
-
Firewall vs. IPS: Will next-generation firewalls nix stand-alone IPS?
News analysis: Will the evolution of next-generation firewalls eliminate the stand-alone IPS market? Sean Martin discusses firewalls vs. IPS. Tip
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
-
IPS/IDS technologies: Innovations and changes
Haven’t shopped for an IDS/IPS in a while? Karen Scarfone details important recent innovations to IDS/IPS technologies. Tip
-
How to implement an enterprise threat assessment methodology
Learn how incorporating an assessment of external threats can increase the accuracy and comprehensiveness of risk assessments. Tip
-
Security in virtualization: IDS/IPS implementation strategy
Considering virtualization? Take into account that your IDS or IPS may not work the same way in a virtualized environment as it does in a physical one. Expert Dave Shackleford explains how to address this potential problem. Tip
-
IDS vs. IPS: How to know when you need the technology
IDS and IPS are useful security technologies, but how do you know whether your enterprise can benefit from one? In this tip, infosec pro Jennifer Jabbusch offers a few specific use cases to help you know when to consider IDS/IPS. Tip
-
Use virtual patching to ease short-staffed patch management procedures
Virtual patching can serve as a quick way to deal with patch management procedures when short staffed. But how effective is virtual patching? Michael Cobb explains the pros and cons of virtual patching in this technical tip. Tip
-
How to buy an IPS: Features, testing and review
If you're considering IPS for your enterprise, make sure you know what to look for in the products you're reviewing. In this tip, network security expert David Meier describes how to conduct an IPS comparison and review of various features, including... Tip
-
Aligning network security with business priorities
Too often, network security administrators have their security budget requests nixed by executives because they weren't able to align their requests with business priorities. In this tip, learn how to make sure your security and business priorities m... Tip
- See more Tips on Network Intrusion Prevention (IPS)
-
Choosing from must-have wireless IPS features
Matthew Pascucci offers tips for choosing a wireless intrusion prevention system, including what critical features to look for. Answer
-
Determining ideal IPS throughput for new implementation
Several factors go into determining IPS throughput requirements. Expert Matt Pascucci explains in this Q&A. Answer
-
Cloud IaaS security: Is a virtual firewall the best bet?
Matthew Pascucci discusses whether organizations should use an IaaS virtual firewall to protect applications that have been moved to the cloud. Answer
-
How to implement firewall policy management with a 5-tuple firewall
Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons. Answer
-
Does .cc domain malware demand domain blocking?
Learn how to deal with .cc domain malware threats found within DNS traffic. Is domain blocking at the perimeter the best defense strategy? Answer
-
BIOS security: Are BIOS attacks worth defending against?
Expert Nick Lewis analyzes the risk of a BIOS attack in juxtaposition to the irritation and expense of securing a network against this threat. Answer
-
How to protect a website from malware redirects
Malware redirects are a serious hazard in the jungle of infiltration exploits; Nick Lewis explains how they can be avoided. Answer
-
Monitor outbound traffic: Full-packet capture or only capture network flow data?
If an enterprise can't afford to implement full-packet capture, expert Mike Chapple recommends trying to capture network flow data instead. Answer
-
Detecting covert channels to prevent enterprise data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis. Answer
-
Is full-disk server encryption software worth the resource overhead?
While encrypting production servers may seem like a good security move, according to Anand Sastry, doing so may not be worth the resources it uses. Answer
- See more Expert Advice on Network Intrusion Prevention (IPS)
-
network behavior analysis (NBA)
Network behavior analysis (NBA) is a method of enhancing the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation... (Continued) Definition
-
Diffie-Hellman key exchange (exponential key exchange)
Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses a number raised to specific powers to produce decryption keys that are never directly transmitted, making the task of a would-be code break... Definition
-
intrusion prevention
Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Definition
-
Countdown: Top 5 ways to tune IDS/IPS to meet business needs
In this podcast, we'll count down the top five ways to tune an IDS/IPS to make sure it's meeting the business requirements you purchased it to meet. Podcast
-
Countdown: Top 5 ways to tune IDS/IPS to meet business needs
In this podcast, we'll count down the top five ways to tune an IDS/IPS to make sure it's meeting the business requirements you purchased it to meet. Podcast
-
Meeting business goals with network security technologies
This video will discuss how moving from primary business functions to more detailed business tasks can help identify goals that network security can assist in meeting. Video
-
SIMs tools and tactics for business intelligence
Security information management systems (SIMs) automate the process of looking through logs to help produce effective reports, issue alerts and do forensics. In the era of regulation, organizations also need added visibility into their networks and a... Video
-
I'll be watching you: Wireless IPS
Focusing on IPS, Lisa Phifer of Core Competence Inc. discusses some of IPS' common features and how it differs from its wired counterparts. Video
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Sourcefire updates malware detection, malware analysis capabilities
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware. News
-
The evolution of threat detection and management
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses. Tip
-
Essentials: Threat detection
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises have to be nimble on the security front in order to keep data safe and attackers at bay. This Essenti... E-Zine
-
Choosing from must-have wireless IPS features
Matthew Pascucci offers tips for choosing a wireless intrusion prevention system, including what critical features to look for. Answer
-
Determining ideal IPS throughput for new implementation
Several factors go into determining IPS throughput requirements. Expert Matt Pascucci explains in this Q&A. Answer
-
Cloud IaaS security: Is a virtual firewall the best bet?
Matthew Pascucci discusses whether organizations should use an IaaS virtual firewall to protect applications that have been moved to the cloud. Answer
-
How to implement firewall policy management with a 5-tuple firewall
Matt Pascucci explains how to implement firewall policy management for 5-tuple firewalls when ports must be kept open for business reasons. Answer
-
Firewall vs. IPS: Will next-generation firewalls nix stand-alone IPS?
News analysis: Will the evolution of next-generation firewalls eliminate the stand-alone IPS market? Sean Martin discusses firewalls vs. IPS. Tip
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware. Tip
- See more All on Network Intrusion Prevention (IPS)
About Network Intrusion Prevention (IPS)
Get advice on how to develop a network intrusion prevention system solution, how to deploy an IPS, such as Snort, and how to choose an IPS.
Security Management Strategies for the CIO