The enterprise IPS balancing act: Simplicity vs. granularity

Network Intrusion Prevention (IPS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Integrated security solutions

    Our security management expert examines how the continual insider threat warrants the need for integrated security solutions and explains how creating a self-defending network helps meet this need. 

  • Using attack responses to improve intrusion detection

    IPSes must detect an attack as it comes into the network; however, IDSes have the advantage of identifying an intrusion based on incoming our outgoing network traffic. 

  • Comparing five of the top network-based inline IPS appliances

    In this issue of Information Security magazine, we put five appliances to the test. Should they be part of your playbook? We review SecureWave's Sanctuary Device Control 3.0.1, Secure Software's CodeAssure Suite, Trend Micro's InterScan Web Security ... 

  • U.S. Postal Service delivers intrusion prevention

    Security Seven award winner Charles McGann discusses how the USPS successfully applied intrusion prevention solutions across their enterprise and how you can do so across your own. 

  • Layered access control: 6 top defenses that work

    Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. 

  • Intrusion prevention: What's next?

    This presentation by Scott Sidel assesses the current product landscape in the intrusion detection, prevention and active defense market. 

  • How to build a secure network from the ground up

    Receive peer advice on what steps are crucial when building a secure network from the ground up. Also learn what resources are available to guide you through this process. 

  • Snort update fixes security hole

    Attackers could exploit a flaw in the open source IDS to gain unauthorized network access, security firms warn. But a fix is available. 

  • Snort users fear future under Check Point

    With Check Point acquiring Sourcefire and its Snort open source IDS, users fear it may be the beginning of the end for one of the industry's most popular security tools. 

  • Leave no trace: Understanding attackers' motives

    This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks.