Network Intrusion Prevention (IPS) News
April 10, 2014
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses.
October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Prevention (IPS) Get Started
Bring yourself up to speed with our introductory content
A threat actor is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- the security of an organization. Continue Reading
A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization. Continue Reading
The IT pro's job is to ensure the enterprise has the best network security possible while providing peak performance. Our guide provides solid steps to take right now. Continue Reading
Evaluate Network Intrusion Prevention (IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading
Expert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading
There are many factors to consider when selecting a security incident and event management (SIEM) product. Read on to learn about the latest SIEM tech advances. Continue Reading
Product ReviewsPowered by IT Central Station
Its default filters include, among 2300 others, protection against buffer overflows and malicious downloads, but be sure to make baseline audits and incident-handling protocols upon deployment.Powered by IT Central Station
Valuable Features: It ships with a default profile that enables approximately 2300 filters for items that should never legitimately exist on a...Continue Reading
Sorting/Blocking/Searching can be done in one or two moves, although it should provide dashboard on-line alerting about current attacks and their sources.Powered by IT Central Station
Valuable Features: Quick and professional service Customer filter creation/deployment Easy-in-use Quick and simple installation without...Continue Reading
Valuable features include signature based analysis and preventing different types of network attacks.Powered by IT Central Station
Valuable Features: Signature based analysis and preventing different types of network attacks. • Room for Improvement: The...Continue Reading
Manage Network Intrusion Prevention (IPS)
Learn to apply best practices and optimize your operations.
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading
Today's protection strategies are trying to take the perimeter and collapse it inwards by focusing more controls across the network on a misbehaving machine or application. Continue Reading
Before making an investment in an intrusion detection and prevention system, be sure to read this list of five final considerations to keep in mind during intrusion detection system evaluation. Continue Reading
Problem Solve Network Intrusion Prevention (IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives Continue Reading
Following the Sony Pictures hack, several of the company's network security shortcomings were revealed. Expert Kevin Beaver explains how better network security may have prevented the extent of the breach. Continue Reading
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading