PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2008

Host-based intrusion prevention addresses server, desktop security

Patty Long has a thousand reasons to deploy host-based intrusion prevention: 1,000 DMZ servers, database servers and application servers. "We were looking across the organization and trying to touch every single application, every server where data--participant data, sponsor data, plan data--would transverse our environment, to make sure we have every point where it's at rest or could pass through covered," says Long, who is with ING's Secu- rity and Risk Management Department. She deployed Third Brigade Deep Security at CitiStreet, which was acquired by ING Group this year (now part of ING Wealth Management). Most people still think in terms of the original host-based intrusion prevention systems (HIPS) technologies, which monitored OS system calls for anomalous behavior. The best known were Okena's StormWatch, which evolved into Cisco Systems' Cisco Security Agent (CSA), and Entercept Security Technologies, whose products became McAfee Host Intrusion Prevention. Today, HIPS encompasses many technologies to protect servers and/...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product Review: Symark PowerADvantage 1.5

    Symark's Symark PowerADvantage allows Unix hosts to become member servers of an AD forest and leverage AD's centralized user management and authentication capabilities.

  • Product Review: Shavlik's NetChk Compliance

    Shavlik's NetChk Compliance automates compliance and provides control by actively managing system and security settings and allows the IT manager to identify and mitigate risks.

Columns in this issue