Network intrusion detection and prevention (IDS-IPS)
Find the latest information on intrusion prevention systems (IPS) and network intrusion detection systems (IDS), including tools and tactics, how to manage host-based and network-based IDSes, minimizing false positives, and how to use intrusion detection methods and devices.
New & Notable



Your Guide to Info Sec Certifications
We’ve collected 30+ certifications for you. Which vendor-neutral and vendor-specific security certifications are best for you? Save time by downloading our list organized by experience level.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Network intrusion detection and prevention (IDS-IPS) News
-
August 05, 2015
05
Aug'15
Security machine learning methods needed to adapt to evolving threats
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
-
June 03, 2015
03
Jun'15
Adversaries never sleep: unknown malware downloaded every 34 seconds
In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.
-
May 21, 2015
21
May'15
Too many false positives, security alerts inundate enterprise, study says
A new study shows enterprises with security analytics are confident in their threat detection capabilities, while those without are overwhelmed by copious false positives and alerts.
-
April 29, 2015
29
Apr'15
Port monitoring critical to detecting, mitigating attacks using SSL
As SSL traffic increases, so inevitably will the number of attacks using it to hide. A session at RSA Conference 2015 explained why hackers love SSL, and how enterprises can defend against them.
Network intrusion detection and prevention (IDS-IPS) Get Started
Bring yourself up to speed with our introductory content
-
unified threat management (UTM)
A unified threat management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and ... Continue Reading
-
Top cybersecurity techniques to prevent data breaches
Learn about important cybersecurity techniques and technologies that serve as the foundation of both day-to-day security operations and incident response. Continue Reading
-
Get ready for CISSP Domain 7: Cyberattack prevention quiz
Do you know what it takes to stop bad guys in their tracks? Find out with this practice quiz on cybersecurity methods and tools used to thwart or recover from an attack. Continue Reading
Evaluate Network intrusion detection and prevention (IDS-IPS) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
The future of networking technology is playing out right now
To prepare for the future of networking technology, IT managers must understand evolving concepts like hyper-convergence, SD-WAN and intent-based networking. Continue Reading
-
Can the STIX security framework improve threat intelligence sharing?
Can Structured Threat Information eXpression improve threat intelligence sharing? Nick Lewis breaks down the evolution of the STIX security framework. Continue Reading
-
Cybersecurity readiness: The importance of continuous network monitoring
Continuous network monitoring and traffic analysis are crucial ingredients for cybersecurity readiness. Expert Peter Sullivan explains what enterprise security teams need to know. Continue Reading
Manage Network intrusion detection and prevention (IDS-IPS)
Learn to apply best practices and optimize your operations.
-
Insider threat behavior: How to identify warning signs
Enterprises can prevent insider threat incidents if they know what to look for. Peter Sullivan explains the precursors to and precipitating events for insider threat behavior. Continue Reading
-
Enterprise scenarios for threat intelligence tools
Expert contributor Ed Tittel explains which types of organizations need threat intelligence tools as part of a proactive, layered security strategy to protect against threats. Continue Reading
-
Set up your system for the best network security possible
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
Problem Solve Network intrusion detection and prevention (IDS-IPS) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How should BGP route hijacking be addressed?
A new report from NIST shows how BGP route hijacking can threaten the internet. Expert Judith Myerson reviews the guidance for improving BGP security. Continue Reading
-
NotPetya malware: How does it detect security products?
Bitdefender discovered that the NotPetya malware changes its behavior when Kaspersky security products are detected. Nick Lewis explains how the malware's tricks work. Continue Reading
-
Devil's Ivy vulnerability: How does it put IoT devices at risk?
A gSOAP flaw was found in an Axis Communications security camera and branded the Devil's Ivy vulnerability. Learn how it threatens IoT devices with expert Nick Lewis. Continue Reading