The enterprise IPS balancing act: Simplicity vs. granularity

Network Intrusion Prevention (IPS)

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Review: Deep Security is a solid IPS

    Third Brigade's Deep Security is a well-designed, effective product with strong configuration and policy control capabilities. 

  • Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies. 

  • Cisco fixes IOS, intrusion defense flaws

    Attackers could exploit the flaws to gain privileged access to a vulnerable device, bypass security restrictions or cause a denial of service. 

  • Review: ISM Express 1000 a mixed bag

    ISM Express is a powerful, useful product with strong reporting and policy management capabilities, but its surprisingly lax security should be tightened. 

  • Countering attackers with NAC, IPS

    Product review: Information Security magazine's Wayne Rash says ForeScout Technologies' flexible CounterACT appliance combines NAC with IPS and is worth the investment. 

  • NAC boosts security for Sun Microsystems

    Cisco's controversial NAC technology has helped Sun Microsystems secure its network, despite analysts who advise waiting until NAC matures and industry-wide standards emerge. 

  • Advance Host Intrusion Prevention with CSA: Advanced Custom Policy

    Examine two key processes for administrators who need to adjust or change Cisco Security Agent default policies. Learn about the normal tuning process and writing application control policies in this excerpt from Chapter 9: Advanced Custom Policy of ... 

  • Extensive coverage in a single box

    McAfee's IntruShield 3000 leverages high port density and Virtual IPS technology to greatly extend network detection capabilities. 

  • Opinion: More security consolidation is on the horizon

    One analyst believes customers will benefit from consolidation in the overcrowded security market, as IPS vendors bow to competitive pressure by adding network behavioral technology to their products. 

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa...