The enterprise IPS balancing act: Simplicity vs. granularity

Network Intrusion Prevention (IPS)

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to buy an IPS: Features, testing and review

    If you're considering IPS for your enterprise, make sure you know what to look for in the products you're reviewing. In this tip, network security expert David Meier describes how to conduct an IPS comparison and review of various features, including... 

  • Aligning network security with business priorities

    Too often, network security administrators have their security budget requests nixed by executives because they weren't able to align their requests with business priorities. In this tip, learn how to make sure your security and business priorities m... 

  • Network intrusion prevention systems: Should enterprises deploy now?

    After a few years of growing pains, today's IPS vendors are touting the maturity of their products. Not so fast, says Mike Chapple. The network security expert explains why the more IPSes "change," the more they stay the same. 

  • Plentiful VoIP exploits demand careful consideration

    Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential ... 

  • Don't let trends dictate your network security strategy

    As with most industries, the information security field has certainly seen its fair share of trends come and go. While some, like network access control, prove to be beneficial, others have proven to be risky. In this tip, Mike Chapple details why on... 

  • How to recover your network after a security breach

    For SMBs that don't have a budget to invest in a full-scale network management system, recovering from a security breach requires more work from the IT staff than just pressing a few buttons. In this tip, Tom Lancaster pinpoints the five most importa... 

  • The key technologies in a network perimeter intrusion defense strategy

    This article lays the groundwork for future discussions of intrusion defense. Joel Snyder introduces technologies that act as strong network perimeter defenses. 

  • Achieving network security with tomorrow's antivirus tools

    Learn about antivirus from an intelligence/technology perspective and offers best practices for simple file-type blocking, and the implementation of heuristic- and reputation-based antivirus tools. 

  • 2006 Products of the Year: Intrusion prevention

    We asked. You answered. Here are our readers' choices for best intrusion prevention products of the year. 

  • Checklist: 11 things to do after a hack

    Your network's been cracked, what do you do next? Contributor Jonathan Hassell recommends following these eleven steps to limit damage and preserve evidence.