Network Intrusion Prevention (IPS) News
April 10, 2014
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses.
October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Prevention (IPS) Get Started
Bring yourself up to speed with our introductory content
Vulnerability management is a pro-active approach to managing network security. Continue Reading
Achieving cybersecurity readiness requires a solid information security architecture. Expert Peter Sullivan explains the core building blocks that enterprises need to build one. Continue Reading
A threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Network Intrusion Prevention (IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this SearchSecurity buyer's guide, learn why it's important to have a wireless intrusion prevention system to protect your Wi-Fi networks and how to pick the right WIPS product. Continue Reading
Expert Karen Scarfone looks at the features and functionality of Mojo Networks' AirTight WIPS, a wireless intrusion prevention system designed to detect and block WLAN attacks. Continue Reading
Expert Karen Scarfone examines Fluke Networks AirMagnet Enterprise, a wireless intrusion prevention system to monitor WLAN events and detect a wide variety of potential problems. Continue Reading
Manage Network Intrusion Prevention (IPS)
Learn to apply best practices and optimize your operations.
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
Signature-based detection and machine learning algorithms identify malicious code and threats. Expert Michael Cobb explains how both techniques defend networks and endpoints. Continue Reading
Detecting network intrusions requires a plethora of information. Expert Kevin Beaver explains why security teams need to take a big picture view of the network. Continue Reading
Problem Solve Network Intrusion Prevention (IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives Continue Reading
Following the Sony Pictures hack, several of the company's network security shortcomings were revealed. Expert Kevin Beaver explains how better network security may have prevented the extent of the breach. Continue Reading
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading