IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like an intrusion detection system (IDS), an intrusion prevention system (IPS) monitors network traffic. However, because an exploit may be carried out very quickly after the attacker gains access, intrusion prevention systems also have the ability to take immediate action,  … 
Definition continues below.
Intrusion PreventionIT Downloads (View All Report Types)
5 Matches
AlienVault Unified Security Mangement: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Symantec Endpoint Protection 12
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.
Posted: 26 May 2011 | Premiered: 26 May 2011

Symantec Corporation

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006

GFI Software
5 Matches
 
INTRUSION PREVENTION DEFINITION (continued): …  based on a set of rules established by the network administrator. For example, an IPS might drop a packet that it determines to be malicious and block all further traffic from that IP address or port. Legitimate traffic, meanwhile, should be forwarded to the recipient with no apparent disruption or delay of service. According to Michael Reed of Top Layer Networks, an effective intrusion prevention system should also perform more complex monitoring and analysis, such as watching and responding to traffic patterns as well as individual packets. "Detection mechanisms can include address matching, … 
Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement