New & Notable
Network Intrusion Prevention (IPS) News
April 10, 2014
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses.
October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Prevention (IPS) Get Started
Bring yourself up to speed with our introductory content
Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision ... Continue Reading
Malicious intruders are intent on breaking into your corporate systems. The latest IDS/IPS technologies, though, are effective means prevent or at least identify and minimize security breaches. Learn what IDS and IPS can do and what the concrete ... Continue Reading
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading
Evaluate Network Intrusion Prevention (IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading
To protect your system it's essential to select an IDS/IPS offering that effectively blocks attacks and complements your existing security controls. Continue Reading
Evaluating IDS/IPS technology requires you to understand its capabilities and how they might complement your existing security infrastructure. Learn about the options available, and what to ask vendors, in order to select the best strategy for your ... Continue Reading
Product ReviewsPowered by IT Central Station
Valuable features include signature based analysis and preventing different types of network attacks.Powered by IT Central Station
Valuable Features: Signature based analysis and preventing different types of network attacks. • Room for Improvement: The...Continue Reading
Powered by IT Central Station
Valuable Features: Great user interface and stable • Improvements to My Organization: Very clear on the findings, great detection...Continue Reading
Powered by IT Central Station
Valuable Features: <ul> <li>Intrusion prevention</li> <li>Digital vaccines</li> <li>Profile...Continue Reading
Manage Network Intrusion Prevention (IPS)
Learn to apply best practices and optimize your operations.
Does a surge in router port scanning mean that the number of infosec risks to home users has risen? Kevin Beaver explains. Continue Reading
An obscure process called TCP/IP reassembly may pose an enterprise network security risk. Learn about this TCP/IP packet format security issue. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading
Problem Solve Network Intrusion Prevention (IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
More granular data is needed from an enterprise IPS than ever before. Brad Casey explores why and reveals other ways to get the info sought. Continue Reading
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses. Continue Reading
Matthew Pascucci offers tips for choosing a wireless intrusion prevention system, including what critical features to look for. Continue Reading