The enterprise IPS balancing act: Simplicity vs. granularity

Network Intrusion Prevention (IPS)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Readers' Choice Awards 2011

    Best Security Information and Event Management Products 2011 

  • Quiz: How IDS/IPS can enable business objectives

    How much have you learned about integrating IDS/IPS with your enterprise's business goals? Find out with this short quiz. 

  • Lesson 4: How to use wireless IPS 2

    In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IPS -- even if your organization doesn't support a wireless LAN. Also, learn how to choose a WIPS for your environment and how to fig... 

  • Lesson 1 quiz: Risky business 2

    How much did you learn about enterprise wireless security from lesson one? Find out how much you retained. 

  • Hacker attack techniques and tactics: Understanding hacking strategies

    This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your network. 

  • Intrusion Defense School

    Your organization's ability to fend off spyware, computer viruses and the latest breed of information security threats hinges on the strength and cohesion of your ... 

  • How IDS-IPS enables business objectives

    In this lesson, learn how key network security practices and technologies can be mapped to business needs 

  • Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by... 

  • Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies. 

  • Advance Host Intrusion Prevention with CSA: Advanced Custom Policy

    Examine two key processes for administrators who need to adjust or change Cisco Security Agent default policies. Learn about the normal tuning process and writing application control policies in this excerpt from Chapter 9: Advanced Custom Policy of ...