By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Network intrusion detection and prevention (IDS-IPS) News
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
June 03, 2015
In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.
May 21, 2015
A new study shows enterprises with security analytics are confident in their threat detection capabilities, while those without are overwhelmed by copious false positives and alerts.
April 29, 2015
As SSL traffic increases, so inevitably will the number of attacks using it to hide. A session at RSA Conference 2015 explained why hackers love SSL, and how enterprises can defend against them.
Network intrusion detection and prevention (IDS-IPS) Get Started
Bring yourself up to speed with our introductory content
An intrusion detection and prevention system for cloud services is an important part of an enterprise's security stature. Expert Frank Siemons discusses IDS/IPS in the cloud. Continue Reading
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
Behavior blacklisting is a security method based on detecting specified suspicious actions on the part of software or human agents and blocking access accordingly. Continue Reading
Evaluate Network intrusion detection and prevention (IDS-IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User behavior analytics can be used for a number of different objectives within an enterprise. Expert Ajay Kumar examines some of the most important features and capabilities. Continue Reading
Expert contributor Ed Tittel explains which types of organizations need threat intelligence tools as part of a proactive, layered security strategy to protect against threats. Continue Reading
User behavior analytics can be beneficial to enterprises, but there are complexities involved. Expert Ajay Kumar explains what companies should know about this new technology. Continue Reading
Manage Network intrusion detection and prevention (IDS-IPS)
Learn to apply best practices and optimize your operations.
Network security alerts are high in number and low in accuracy. Expert Kevin Beaver explains strategies security professionals can develop to overcome these obstacles to improving security. Continue Reading
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
Signature-based detection and machine learning algorithms identify malicious code and threats. Expert Michael Cobb explains how both techniques defend networks and endpoints. Continue Reading
Problem Solve Network intrusion detection and prevention (IDS-IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The PoisonTap exploit can bypass password locks on computers, enabling an attacker to remotely control systems. Expert Nick Lewis explains how the attack works. Continue Reading
A flaw that allows attackers to load malicious DLL files in Symantec products was labeled as severe. Expert Michael Cobb explains the vulnerability and its classification. Continue Reading
An Intel chip flaw lets attackers bypass ASLR protection on most operating systems. Expert Michael Cobb explains the vulnerability and how to prevent attacks. Continue Reading