IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like an intrusion detection system (IDS), an intrusion prevention system (IPS) monitors network traffic. However, because an exploit may be carried out very quickly after the attacker gains access, intrusion prevention systems also have the ability to take immediate action,  … 
Definition continues below.
Intrusion PreventionWhite Papers (View All Report Types)
51 - 75 of 109 Matches Previous Page  | Next Page
Stopping Fake Antivirus: How to Keep Scareware off Your Network
sponsored by Sophos, Inc.
WHITE PAPER: This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Posted: 04 Oct 2011 | Published: 01 Sep 2011

Sophos, Inc.

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Intrusion prevention service with iSensor
sponsored by Dell, Inc.
WHITE PAPER: Anti-virus and firewalls technologies are not enough to protect your business from emerging threats. Discover an advanced security solution that offers intrusion prevention services to help monitor your network and deliver exceptional threat protection. Read this paper to learn how to stay ahead of the latest threats and secure your networks.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

Cybersecurity Readiness Study: An Executive Summary
sponsored by ArcSight, an HP Company
WHITE PAPER: This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Driving Down the Total Cost of Protection
sponsored by Kaspersky Lab
WHITE PAPER: This white paper touches on a new malware protection system that was designed for today and tomorrow. It provides the best overall protection for all businesses and does this with the best total cost of protection available today.
Posted: 12 May 2011 | Published: 11 May 2011

Kaspersky Lab

Magic Quadrant for Mobile Data Protection
sponsored by Sophos, Inc.
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

Top 5 Threat Protection Best Practices
sponsored by Sophos, Inc.
WHITE PAPER: The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware
sponsored by Sophos, Inc.
WHITE PAPER: Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Top 5 Considerations for Choosing a Next-Generation Firewall: SonicWALL vs. Palo Alto Networks and Fortinet
sponsored by SonicWALL
WHITE PAPER: Thanks to Web 2.0 and an explosion of Web-based applications, nearly two-thirds of today's traffic is HTTP and HTTPS. Collaboration, increased productivity and improved insights into customers and prospects are all key benefits of Web 2.0.  But with these benefits come new security threats as well as dramatic increases in network bandwidth consumed
Posted: 18 Mar 2011 | Published: 18 Mar 2011

SonicWALL

Intelligent real-time protection and application control
sponsored by SonicWALL
WHITE PAPER: It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SonicWALL

Rethinking Perimeter Security: New Threats Require Real-Time Protection
sponsored by Radware
WHITE PAPER: Over the last few years, networked resources have become increasingly available to a wide audience of customers, partners, suppliers, and the general public. As a result, more and more people have become reliant upon instantaneous access to information and services in order to do business.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

Radware

SuperMassive E10000 Series Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

SonicWALL TZ Series
sponsored by SonicWALL
WHITE PAPER: Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

Securing Virtual Compute Infrastructure in the Cloud
sponsored by SAVVIS
WHITE PAPER: Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

SAVVIS

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Take Back Control: Increase Security, Empower Employees, Protect the Business
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware
sponsored by Sophos, Inc.
WHITE PAPER: Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.
Posted: 25 Jun 2010 | Published: 24 Jun 2010

Sophos, Inc.

Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Posted: 01 Jun 2010 | Published: 01 Apr 2010

WatchGuard Technologies, Inc.

Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER: For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009

Trend Micro

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Generating New Revenue Streams and Increasing Network Security: Dynamic Application Awareness and Intrusion Prevention System
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper examines ways in which dynamic application awareness and intrusion prevention system (IPS) software solutions enable service providers to increase revenue while expanding service flexibility, richness, and reach. The paper then describes the technologies behind these advanced solutions. Read on to learn more.
Posted: 10 Feb 2010 | Published: 10 Dec 2009

Juniper Networks, Inc.
51 - 75 of 109 Matches Previous Page    1 2 3 4 5    Next Page
 
INTRUSION PREVENTION DEFINITION (continued): …  based on a set of rules established by the network administrator. For example, an IPS might drop a packet that it determines to be malicious and block all further traffic from that IP address or port. Legitimate traffic, meanwhile, should be forwarded to the recipient with no apparent disruption or delay of service. According to Michael Reed of Top Layer Networks, an effective intrusion prevention system should also perform more complex monitoring and analysis, such as watching and responding to traffic patterns as well as individual packets. "Detection mechanisms can include address matching, … 
Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement