Network Intrusion Prevention (IPS) News
April 10, 2014
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses.
October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
Network Intrusion Prevention (IPS) Get Started
Bring yourself up to speed with our introductory content
Following the Sony Pictures hack, several of the company's network security shortcomings were revealed. Expert Kevin Beaver explains how better network security may have prevented the extent of the breach. Continue Reading
A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless LAN network's radio spectrum for rogue access points and other wireless threats. Continue Reading
Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know. Continue Reading
Evaluate Network Intrusion Prevention (IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security expert Bill Hayes discusses the top benefits of intrusion detection systems, including identifying and preventing security incidents, protecting vulnerable assets, improving ROI and more. Continue Reading
Before making an investment in an intrusion detection and prevention system, be sure to read this list of five final considerations to keep in mind during intrusion detection system evaluation. Continue Reading
Intrusion detection and preventions systems can be critical components to an enterprise's threat management strategy. Learn the history behind the technologies and why they are so important. Continue Reading
Manage Network Intrusion Prevention (IPS)
Learn to apply best practices and optimize your operations.
Today's protection strategies are trying to take the perimeter and collapse it inwards by focusing more controls across the network on a misbehaving machine or application. Continue Reading
Does a surge in router port scanning mean that the number of infosec risks to home users has risen? Kevin Beaver explains. Continue Reading
An obscure process called TCP/IP reassembly may pose an enterprise network security risk. Learn about this TCP/IP packet format security issue. Continue Reading
Problem Solve Network Intrusion Prevention (IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Host-based IDSes and network-based IDSes have several differences. Expert Kevin Beaver discusses how to find the best option for your enterprise needs. Continue Reading
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading
What's the difference between mobile IDS/IPS and traditional IDS/IPS? Expert Brad Casey discusses the value proposition for enterprise deployment. Continue Reading